Sciweavers

5722 search results - page 1060 / 1145
» Security Function Interactions
Sort
View
116
Voted
HICSS
2003
IEEE
151views Biometrics» more  HICSS 2003»
15 years 7 months ago
A Simple GSPN for Modeling Common Mode Failures in Critical Infrastructures
It is now apparent that our nation’s infrastructures and essential utilities have been optimized for reliability in benign operating environments. As such, they are susceptible ...
Axel W. Krings, Paul W. Oman
107
Voted
SAC
2003
ACM
15 years 7 months ago
Systems Architecture for Pervasive Retail
Recent developments in mobile technologies and associated economies of scale via mature manufacturing processes have made possible the construction of pervasive systems in specifi...
George Roussos, Panos Kourouthanasis, Eugene A. Gr...
119
Voted
EUROCRYPT
2003
Springer
15 years 7 months ago
Resettable Zero-Knowledge in the Weak Public-Key Model
A new public-key model for resettable zero-knowledge (rZK) protocols, which is an extension and generalization of the upper-bounded public-key (UPK) model introduced by Micali and ...
Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu
133
Voted
ICCS
2003
Springer
15 years 7 months ago
visPerf: Monitoring Tool for Grid Computing
This paper describes a monitoring tool for grid computing[5], called visPerf. It is difficult to see the status of a working production grid system without a customized monitorin...
DongWoo Lee, Jack Dongarra, Rudrapatna S. Ramakris...
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
15 years 7 months ago
Automatic contention detection and amelioration for data-intensive operations
To take full advantage of the parallelism offered by a multicore machine, one must write parallel code. Writing parallel code is difficult. Even when one writes correct code, the...
John Cieslewicz, Kenneth A. Ross, Kyoho Satsumi, Y...
« Prev « First page 1060 / 1145 Last » Next »