Sciweavers

839 search results - page 160 / 168
» Communication Optimizations for Parallel Computing Using Dat...
Sort
View
CCS
2009
ACM
14 years 1 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
PC
2010
196views Management» more  PC 2010»
13 years 7 months ago
Solving path problems on the GPU
We consider the computation of shortest paths on Graphic Processing Units (GPUs). The blocked recursive elimination strategy we use is applicable to a class of algorithms (such as...
Aydin Buluç, John R. Gilbert, Ceren Budak
DIGITALCITIES
2003
Springer
14 years 1 months ago
Visualizing Social Patterns in Virtual Environments on a Local and Global Scale
Today a wide variety of virtual worlds, cities, gaming environments etc. exist and become part of life of their human inhabitants. However, our understanding on how technology infl...
Katy Börner, Shashikant Penumarthy, Bonnie Je...
BMCBI
2010
104views more  BMCBI 2010»
13 years 8 months ago
FragViz: visualization of fragmented networks
Background: Researchers in systems biology use network visualization to summarize the results of their analysis. Such networks often include unconnected components, which popular ...
Miha Stajdohar, Minca Mramor, Blaz Zupan, Janez De...
DCOSS
2011
Springer
12 years 8 months ago
A local average consensus algorithm for wireless sensor networks
—In many application scenarios sensors need to calculate the average of some local values, e.g. of local measurements. A possible solution is to rely on consensus algorithms. In ...
Konstantin Avrachenkov, Mahmoud El Chamie, Giovann...