Sciweavers

1585 search results - page 24 / 317
» Automatically optimizing secure computation
Sort
View
CDC
2009
IEEE
14 years 15 days ago
Ordinal optimization based security dispatching in deregulated power systems
— Due to the uncertainty in the forecasting of load patterns, security dispatching finds the generation pattern, which is the most economic and passes all N − 1 contingencies ...
Qing-Shan Jia, Min Xie, Felix F. Wu
TCS
2008
13 years 7 months ago
Optimizing deletion cost for secure multicast key management
Multicast and broadcast are efficient ways to deliver messages to a group of recipients in a network. Due to the growing security concerns in various applications, messages are oft...
Zhi-Zhong Chen, Ze Feng, Minming Li, F. Frances Ya...
SOUPS
2010
ACM
13 years 11 months ago
Optimizing a policy authoring framework for security and privacy policies
Policies which address security and privacy are pervasive parts of both technical and social systems, and technology to enable both organizations and individuals to create and man...
Maritza Johnson, John Karat, Clare-Marie Karat, Ke...
ISPEC
2010
Springer
14 years 27 days ago
On Fast and Approximate Attack Tree Computations
Abstract. In this paper we address the problem of inefficiency of exact attack tree computations. We propose several implementation-level optimizations and introduce a genetic algo...
Aivo Jürgenson, Jan Willemson
ICCS
2001
Springer
14 years 7 days ago
Optimizing Sparse Matrix Computations for Register Reuse in SPARSITY
Abstract. Sparse matrix-vector multiplication is an important computational kernel that tends to perform poorly on modern processors, largely because of its high ratio of memory op...
Eun-Jin Im, Katherine A. Yelick