Sciweavers

7504 search results - page 272 / 1501
» Computing with Action Potentials
Sort
View
142
Voted
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
15 years 8 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya
105
Voted
SC
2004
ACM
15 years 8 months ago
GPU Cluster for High Performance Computing
Inspired by the attractive Flops/dollar ratio and the incredible growth in the speed of modern graphics processing units (GPUs), we propose to use a cluster of GPUs for high perfo...
Zhe Fan, Feng Qiu, Arie E. Kaufman, Suzanne Yoakum...
MIDDLEWARE
2004
Springer
15 years 7 months ago
Kernel-middleware interaction to support adaptation in pervasive computing environments
In pervasive computing environments, conditions are highly variable and resources are limited. In order to meet the needs of applications, systems must adapt dynamically to changi...
Farshad A. Samimi, Philip K. McKinley, Seyed Masou...
IPPS
2003
IEEE
15 years 7 months ago
Performance and Overhead in a Hybrid Reconfigurable Computer
In this paper, we overview general hardware architecture and a programming model of SRC-6ETM reconfigurable computers, and compare the performance of the SRC-6E machine vs. IntelĀ...
Osman Devrim Fidanci, Daniel S. Poznanovic, Kris G...
HPDC
2002
IEEE
15 years 7 months ago
Decoupling Computation and Data Scheduling in Distributed Data-Intensive Applications
In high energy physics, bioinformatics, and other disciplines, we encounter applications involving numerous, loosely coupled jobs that both access and generate large data sets. So...
Kavitha Ranganathan, Ian T. Foster