Sciweavers

7426 search results - page 172 / 1486
» The LHC Computing Challenge
Sort
View
NSDI
2008
15 years 7 months ago
A User Study Design for Comparing the Security of Registration Protocols
We present the design of a user study for comparing the security of two registration mechanisms for initializing credentials in machine authentication protocols, such as SiteKey. ...
Chris Karlof, J. Doug Tygar, David Wagner
ACMIDC
2008
15 years 7 months ago
Supporting parent-child interaction in divorced families
Divorce affects a significant number of children and parents. In this work, I discuss the challenges that these families may face and present two systems that may help address som...
Svetlana Yarosh
CIE
2007
Springer
15 years 11 months ago
From Logic to Physics: How the Meaning of Computation Changed over Time
The intuition guiding the de…nition of computation has shifted over time, a process that is re‡ected in the changing formulations of the Church-Turing thesis. The theory of co...
Itamar Pitowsky
IC
2010
15 years 2 months ago
Cloud Computing - The Next Revolution in Information Technology
: Computing is being transformed to a model consisting of services that are commoditised and delivered in a manner similar to utilities such as water, electricity, gas, and telepho...
Rajkumar Buyya
INFOCOM
2011
IEEE
14 years 8 months ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang