Sciweavers

468 search results - page 21 / 94
» Cryptographic and Computational Challenges in Grid Computing
Sort
View
153
Voted
CCS
2007
ACM
15 years 10 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
132
Voted
SP
2002
IEEE
117views Security Privacy» more  SP 2002»
15 years 3 months ago
Grids: The top ten questions
The design and implementation of a national computing system and data grid has become a reachable goal from both the computer science and computational science point of view. A di...
Jennifer M. Schopf, Bill Nitzberg
126
Voted
IPPS
2005
IEEE
15 years 9 months ago
GridIS: An Incentive-Based Grid Scheduling
In a grid computing environment, resources are autonomous, wide-area distributed, and what’s more, they are usually not free. These unique characteristics make scheduling in a s...
Lijuan Xiao, Yanmin Zhu, Lionel M. Ni, Zhiwei Xu
103
Voted
JFR
2006
72views more  JFR 2006»
15 years 3 months ago
KAT-5: Robust systems for autonomous vehicle navigation in challenging and unknown terrain
Kat-5 was the fourth vehicle to make history in DARPA's 2005 Grand Challenge, where for the first time ever, autonomous vehicles were able to travel through 100 miles of roug...
Paul G. Trepagnier, Jorge Nagel, Powell M. Kinney,...
106
Voted
ICCS
2005
Springer
15 years 9 months ago
H2O Metacomputing - Jini Lookup and Discovery
Because of its inter-organisational, collaborative use of computational resources, grid computing presents a severe interoperability challenge to grid application developers. Diffe...
Dirk Gorissen, Gunther Stuer, Kurt Vanmechelen, Ja...