Sciweavers

2139 search results - page 236 / 428
» Distributed computing and computer security education
Sort
View
134
Voted
CW
2004
IEEE
15 years 7 months ago
An Interactive Agent-Based Learning Environment for Children
This paper presents an educational distributed virtual reality-based environment for children called EVE - Environnement Virtuel pour Enfants. EVE is used in elementary schools fr...
Dorin Mircea Popovici, Cédric Buche, Ronan ...
IPPS
2009
IEEE
15 years 10 months ago
Performance prediction for running workflows under role-based authorization mechanisms
When investigating the performance of running scientific/ commercial workflows in parallel and distributed systems, we often take into account only the resources allocated to the ...
Ligang He, Mark Calleja, Mark Hayes, Stephen A. Ja...
74
Voted
ESCIENCE
2007
IEEE
15 years 9 months ago
Multiple Middleware Co-existence: Another Aspect of Grid Interoperation
Since the birth of computational and data grids, many middlewares have been developed and deployed. Currently, they are used in a multitude of isolated e-Infrastructures and a hot...
Roberto Barbera, Marco Fargetta, Emidio Giorgio
115
Voted
PERCOM
2008
ACM
16 years 3 months ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar
106
Voted
SAFECOMP
2005
Springer
15 years 9 months ago
Public-Key Cryptography and Availability
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...
Tage Stabell-Kulø, Simone Lupetti