Sciweavers

312 search results - page 7 / 63
» Performance of an MPI-IO Implementation Using Third-Party Tr...
Sort
View
WPES
2005
ACM
14 years 1 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
EUROSYS
2008
ACM
14 years 4 months ago
Samurai: protecting critical data in unsafe languages
Programs written in type-unsafe languages such as C and C++ incur costly memory errors that result in corrupted data structures, program crashes, and incorrect results. We present...
Karthik Pattabiraman, Vinod Grover, Benjamin G. Zo...
SUTC
2006
IEEE
14 years 1 months ago
Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks
- In this paper, we describe a group key management protocol for hierarchical sensor networks where instead of using pre-deployed keys, each sensor node generates a partial key dyn...
Biswajit Panja, Sanjay Kumar Madria, Bharat K. Bha...
SWS
2004
ACM
14 years 1 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
IPPS
2007
IEEE
14 years 1 months ago
High-Performance Multi-Rail Support with the NEWMADELEINE Communication Library
This paper focuses on message transfers across multiple heterogeneous high-performance networks in the NEWMADELEINE Communication Library. NEWMADELEINE features a modular design t...
Olivier Aumage, Elisabeth Brunet, Guillaume Mercie...