Sciweavers

143 search results - page 12 / 29
» Low Cost Secure Computation for the General Client-Server Co...
Sort
View
SC
2004
ACM
14 years 22 days ago
Analysis and Performance Results of a Molecular Modeling Application on Merrimac
The Merrimac supercomputer uses stream processors and a highradix network to achieve high performance at low cost and low power. The stream architecture matches the capabilities o...
Mattan Erez, Jung Ho Ahn, Ankit Garg, William J. D...
WPES
2004
ACM
14 years 22 days ago
Will your digital butlers betray you?
The cost of data storage is now so low that there is little necessity ever to delete anything. The consequence is denied oblivion—digital systems that remember forever and can b...
Frank Stajano
SMI
2005
IEEE
14 years 27 days ago
Curvature-based Energy for Simulation and Variational Modeling
Curvature-based energy and forces are used in a broad variety of contexts, ranging from modeling of thin plates and shells to surface fairing and variational surface design. The a...
Denis Zorin
SOUPS
2009
ACM
14 years 1 months ago
Personal choice and challenge questions: a security and usability assessment
Challenge questions are an increasingly important part of mainstream authentication solutions, yet there are few published studies concerning their usability or security. This pap...
Mike Just, David Aspinall
IWSEC
2010
Springer
13 years 5 months ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo