Sciweavers

340 search results - page 27 / 68
» A Simple User Authentication Scheme for Grid Computing
Sort
View
CAGD
2008
98views more  CAGD 2008»
13 years 7 months ago
Exact evaluation of limits and tangents for non-polynomial subdivision schemes
In this paper, we describe a method for exact evaluation of a limit mesh defined via subdivision and its associated tangent vectors on a uniform grid of any size. Other exact eval...
S. Schaefer, J. Warren
ACNS
2008
Springer
96views Cryptology» more  ACNS 2008»
13 years 9 months ago
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns
Abstract. "Pairing" is referred to as the operation of achieving authenticated key agreement between two human-operated devices over a short- or medium-range wireless com...
Ramnath Prasad, Nitesh Saxena
SP
2002
IEEE
129views Security Privacy» more  SP 2002»
13 years 7 months ago
The XCAT Science Portal
The design and prototype implementation of the XCAT Grid Science Portal is described in this paper. The portal lets grid application programmers easily script complex distributed ...
Sriram Krishnan, Randall Bramley, Dennis Gannon, R...
GRID
2004
Springer
14 years 1 months ago
MARS: A Metascheduler for Distributed Resources in Campus Grids
Computational grids are increasingly being deployed in campus environments to provide unified access to distributed and heterogeneous resources such as clusters, storage arrays, ...
Abhijit Bose, Brian Wickman, Cameron Wood
AINA
2005
IEEE
14 years 1 months ago
A Practical Modelling Notation for Secure Distributed Computation
Mobile code computation has lead to a new paradigm of distributed computation. A mobile process can move from site to site and interact with the resources as a local process. To p...
Yih-Jiun Lee, Peter Henderson