Sciweavers

327 search results - page 42 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
SC
2009
ACM
14 years 5 months ago
Early performance evaluation of a "Nehalem" cluster using scientific and engineering applications
In this paper, we present an early performance evaluation of a 624-core cluster based on the Intel® Xeon® Processor 5560 (code named “Nehalem-EP”, and referred to as Xeon 55...
Subhash Saini, Andrey Naraikin, Rupak Biswas, Davi...
SACMAT
2009
ACM
14 years 4 months ago
A decision support system for secure information sharing
In both the commercial and defense sectors a compelling need is emerging for highly dynamic, yet risk optimized, sharing of information across traditional organizational boundarie...
Achille Fokoue, Mudhakar Srivatsa, Pankaj Rohatgi,...
PAIRING
2010
Springer
152views Cryptology» more  PAIRING 2010»
13 years 8 months ago
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
Koen Simoens, Roel Peeters, Bart Preneel
CMOT
2010
176views more  CMOT 2010»
13 years 7 months ago
A cognitive model of spatial path-planning
Planning a path to a destination, given a number of options and obstacles, is a common task. We suggest a two-component cognitive model that combines retrieval of knowledge about t...
David Reitter, Christian Lebiere
BIBE
2007
IEEE
101views Bioinformatics» more  BIBE 2007»
14 years 4 months ago
A Robotic System for Real-time Tumor Manipulation During Image guided Breast Biopsy
Breast biopsy guided by imaging techniques such as ultrasound is widely used to evaluate suspicious masses within the breast. Currently, ultrasound imaging does not allow live guid...
Vishnu Mallapragada, Nilanjan Sarkar, Tarun Kanti ...