Sciweavers

SP
2008
IEEE
113views Security Privacy» more  SP 2008»
13 years 7 months ago
Inter-operating grids through Delegated MatchMaking
The grid vision of a single computing utility has yet to materialize: while many grids with thousands of processors each exist, most work in isolation. An important obstacle for t...
Alexandru Iosup, Todd Tannenbaum, Matthew Farrelle...
SP
2008
IEEE
110views Security Privacy» more  SP 2008»
13 years 7 months ago
Software Review
Michael Wester
SP
2008
IEEE
118views Security Privacy» more  SP 2008»
13 years 7 months ago
Cheaper adjoints by reversing address computations
Laurent Hascoët, Jean Utke, Uwe Naumann
SP
2008
IEEE
140views Security Privacy» more  SP 2008»
13 years 7 months ago
Knowledge support and automation for performance analysis with PerfExplorer 2.0
The integration of scalable performance analysis in parallel development tools is difficult. The potential size of data sets and the need to compare results from multiple experime...
Kevin A. Huck, Allen D. Malony, Sameer Shende, Ala...
SP
2008
IEEE
122views Security Privacy» more  SP 2008»
13 years 7 months ago
Large-scale phylogenetic analysis on current HPC architectures
Abstract. Phylogenetic inference is considered a grand challenge in Bioinformatics due to its immense computational requirements. The increasing popularity and availability of larg...
Michael Ott, Jaroslaw Zola, Srinivas Aluru, Andrew...
SP
2008
IEEE
113views Security Privacy» more  SP 2008»
13 years 7 months ago
Biological data mining
Mohammed Javeed Zaki, Naren Ramakrishnan, Srinivas...
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 7 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
13 years 7 months ago
Compromising Reflections-or-How to Read LCD Monitors around the Corner
We present a novel eavesdropping technique for spying at a distance on data that is displayed on an arbitrary computer screen, including the currently prevalent LCD monitors. Our ...
Michael Backes, Markus Dürmuth, Dominique Unr...
SP
2008
IEEE
13 years 7 months ago
Predictable Design of Network-Based Covert Communication Systems
This paper presents a predictable and quantifiable approach to designing a covert communication system capable of effectively exploiting covert channels found in the various layer...
Ronald William Smith, George Scott Knight