Sciweavers

1800 search results - page 326 / 360
» A component model for internet-scale applications
Sort
View
ESORICS
2010
Springer
13 years 9 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
HPDC
2010
IEEE
13 years 9 months ago
Fast and scalable simulation of volunteer computing systems using SimGrid
Advances in internetworking technology and the decreasing cost-performance ratio of commodity computing components have enabled Volunteer Computing (VC). VC platforms aggregate te...
Bruno Donassolo, Henri Casanova, Arnaud Legrand, P...
CONCURRENCY
2008
112views more  CONCURRENCY 2008»
13 years 8 months ago
Building and applying geographical information system Grids
: We discuss the development and application of Web Service-based Geographical Information System Grids. Following the WS-I+ approach of building Grids on Web Service standards, we...
Galip Aydin, Ahmet Sayar, Harshawardhan Gadgil, Me...
JMLR
2006
131views more  JMLR 2006»
13 years 8 months ago
On Representing and Generating Kernels by Fuzzy Equivalence Relations
Kernels are two-placed functions that can be interpreted as inner products in some Hilbert space. It is this property which makes kernels predestinated to carry linear models of l...
Bernhard Moser
AC
2005
Springer
13 years 8 months ago
Power Analysis and Optimization Techniques for Energy Efficient Computer Systems
Reducing power consumption has become a major challenge in the design and operation of today's computer systems. This chapter describes different techniques addressing this c...
Wissam Chedid, Chansu Yu, Ben Lee