Sciweavers

376 search results - page 62 / 76
» Integrating Trust in Grid Computing Systems
Sort
View
100
Voted
VIS
2004
IEEE
174views Visualization» more  VIS 2004»
15 years 11 months ago
A Graphics Hardware-Based Vortex Detection and Visualization System
Feature detection in flow fields is a well researched area, but practical application is often difficult due to the numerical complexity of the algorithms preventing interactive u...
Simon Stegmaier, Thomas Ertl
MIDDLEWARE
2005
Springer
15 years 3 months ago
Managing the follow-me semantics to build large-scale pervasive applications
In this paper, we present the concept of follow-me semantics of the large-scale pervasive application and discuss the features and services to its implementation based on the inte...
Iara Augustin, Adenauer C. Yamin, Cláudio F...
ICAC
2005
IEEE
15 years 3 months ago
Distributed Troubleshooting Agents
Key issues to address in autonomic job recovery for cluster computing are recognizing job failure; understanding the failure sufficiently to know if and how to restart the job; an...
Charles Earl, Emilio Remolina, Jim Ong, John Brown
ICS
2003
Tsinghua U.
15 years 2 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
DISCEX
2003
IEEE
15 years 2 months ago
Monterey Security Enhanced Architecture Project
This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mech...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...