Sciweavers

1573 search results - page 276 / 315
» Strong User Authentication
Sort
View
CLUSTER
2001
IEEE
15 years 1 months ago
NPACI Rocks: Tools and Techniques for Easily Deploying Manageable Linux Clusters
High-performance computing clusters (commodity hardware with low-latency, high-bandwidth interconnects) based on Linux, are rapidly becoming the dominant computing platform for a ...
Philip M. Papadopoulos, Mason J. Katz, Greg Bruno
FC
2000
Springer
127views Cryptology» more  FC 2000»
15 years 1 months ago
Blind, Auditable Membership Proofs
Auditability is an important property in nancial systems and architectures. Here we de ne the primitive of blind auditable membership proof" BAMP which combines public auditab...
Tomas Sander, Amnon Ta-Shma, Moti Yung
ISSS
1995
IEEE
87views Hardware» more  ISSS 1995»
15 years 1 months ago
Industrial experience using rule-driven retargetable code generation for multimedia applications
The increasing usage of Application Specific Instruction Set Processors (ASIPs) in audio and video telecommunications has made strong demands on the rapid availability of dedicat...
Clifford Liem, Pierre G. Paulin, Marco Cornero, Ah...
HT
1991
ACM
15 years 1 months ago
Identifying Aggregates in Hypertext Structures
Hypertext systems are being used in many applications because of their flexible structure and the great browsing freedom they give to diverse communities of users. However, this s...
Rodrigo A. Botafogo, Ben Shneiderman
BIRD
2008
Springer
123views Bioinformatics» more  BIRD 2008»
14 years 11 months ago
E-BioFlow: Different Perspectives on Scientific Workflows
We introduce a new type of workflow design system called e-BioFlow and illustrate it by means of a simple sequence alignment workflow. E-BioFlow, intended to model advanced scienti...
Ingo H. C. Wassink, Han Rauwerda, Paul E. van der ...