Sciweavers

20175 search results - page 29 / 4035
» Is abstraction the key to computing
Sort
View
96
Voted
NDT
2010
14 years 7 months ago
Ontology Based Tracking and Propagation of Provenance Metadata
Abstract. Tracking the provenance of application data is of key importance in the network environment due to the abundance of heterogeneous and controllable resources. We focus on ...
Miroslav Vacura, Vojtech Svátek
125
Voted
HCW
2000
IEEE
15 years 4 months ago
Heterogeneity as Key Feature of High Performance Computing: the PQE1 Prototype
In this work we present the results of a project aimed at assembling an hybrid massively parallel machine, the PQE1 prototype, devoted to the simulation of complex physical models...
Paolo Palazzari, Lidia Arcipiani, Massimo Celino, ...
ICNP
2006
IEEE
15 years 6 months ago
Key Grids: A Protocol Family for Assigning Symmetric Keys
We describe a family of ÐÓ Ò protocols for assigning symmetric keys to Ò processes in a network so that each process can use its assigned keys to communicate securely with eve...
Amitanand S. Aiyer, Lorenzo Alvisi, Mohamed G. Gou...
113
Voted
ICICS
2009
Springer
15 years 7 months ago
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks
Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng...