Sciweavers

8655 search results - page 137 / 1731
» Challenges for Trusted Computing
Sort
View
96
Voted
CLUSTER
2007
IEEE
15 years 9 months ago
The challenges and rewards of petascale clusters
-Jul 2 - Santa Clara Conv Ctr - abstracts by 4/30 Asilomar Conference on Signals, Systems, and Computers due by June 1 [more] - Nov 1-4, 2009 - Asilomar Conf Grounds, Pacific Grove...
Mark Seager
113
Voted
IPPS
2007
IEEE
15 years 9 months ago
Challenges in Mapping Graph Exploration Algorithms on Advanced Multi-core Processors
Multi-core processors are a shift of paradigm in computer architecture that promises a dramatic increase in performance. But multi-core processors also bring an unprecedented leve...
Oreste Villa, Daniele Paolo Scarpazza, Fabrizio Pe...
110
Voted
IJCAI
2003
15 years 4 months ago
Modeling Web Navigation: Methods and Challenges
A computational cognitive model of Web navigation is a working computer system that simulates human users searching for items in a Web site. A fully working model must automate asp...
Craig S. Miller
110
Voted
CHI
2011
ACM
14 years 6 months ago
Social and technical challenges in parenting teens' social media use
With millions of teenagers on the Internet, millions of parents are trying to understand what their teens are doing and why. Understanding how technology use impacts teens‘ lear...
Sarita Yardi, Amy Bruckman
134
Voted
ACSAC
1999
IEEE
15 years 7 months ago
Safe Areas of Computation for Secure Computing with Insecure Applications
Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
André L. M. dos Santos, Richard A. Kemmerer