Sciweavers

1988 search results - page 282 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
ACSAC
2009
IEEE
14 years 1 months ago
Justifying Integrity Using a Virtual Machine Verifier
Emerging distributed computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in the computation. While integrity measuremen...
Joshua Schiffman, Thomas Moyer, Christopher Shal, ...
EUROPAR
2008
Springer
13 years 10 months ago
MPC: A Unified Parallel Runtime for Clusters of NUMA Machines
Over the last decade, Message Passing Interface (MPI) has become a very successful parallel programming environment for distributed memory architectures such as clusters. However, ...
Marc Pérache, Hervé Jourdren, Raymon...
ANCS
2005
ACM
14 years 2 months ago
Addressing data compatibility on programmable network platforms
Large-scale applications require the efficient exchange of data across their distributed components, including data from heterogeneous sources and to widely varying clients. Inher...
Ada Gavrilovska, Karsten Schwan
GRID
2005
Springer
14 years 2 months ago
Adaptive trust negotiation and access control for grids
— Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users a...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria...
IADIS
2008
13 years 10 months ago
Towards Simple Interaction In The Classroom: An Nfc Approach
In a given environment, distributing different devices with computing capabilities around us opens up new possibilities. It allows simple and easy interaction between user and com...
Salvador W. Nava, Gabriel Chavira, Ramón He...