Sciweavers

340 search results - page 43 / 68
» A Simple User Authentication Scheme for Grid Computing
Sort
View
GRID
2007
Springer
14 years 1 months ago
Adaptive pricing for resource reservations in Shared environments
Application scheduling studies on large-scale shared resources have advocated the use of resource provisioning in the form of advance reservations for providing predictable and de...
Gurmeet Singh, Carl Kesselman, Ewa Deelman
GIS
2010
ACM
13 years 5 months ago
Natural neighbor interpolation based grid DEM construction using a GPU
With modern LiDAR technology the amount of topographic data, in the form of massive point clouds, has increased dramatically. One of the most fundamental GIS tasks is to construct...
Alex Beutel, Thomas Mølhave, Pankaj K. Agar...
NDSS
2008
IEEE
14 years 2 months ago
A New Privacy-Enhanced Matchmaking Protocol
Although several wide-spread internet applications (e.g., job-referral services, dating services) can benefit from online matchmaking, protocols defined over the past two decade...
Ji Sun Shin, Virgil D. Gligor
ICPADS
2005
IEEE
14 years 1 months ago
Separable and Anonymous Identity-Based Key Issuing
Abstract. In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is respo...
Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hu...
AAAI
1997
13 years 9 months ago
The Sounds of Silence: Towards Automated Evaluation of Student Learning in a Reading Tutor that Listens
1 We propose a paradigm for ecologically valid, authentic, unobtrusive, automatic, data-rich, fast, robust, and sensitive evaluation of computer-assisted student performance. We i...
Jack Mostow, Gregory Aist