Sciweavers

SP
2008
IEEE
132views Security Privacy» more  SP 2008»
13 years 11 months ago
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Michael Backes, Matteo Maffei, Dominique Unruh
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
14 years 10 days ago
Discover gene specific local co-regulations from time-course gene expression data
Discovering gene co-regulatory relationships is one of most important research in DNA microarray data analysis. The problem of gene specific co-regulation discovery is to, for a p...
Ji Zhang, Qigang Gao, Hai H. Wang
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
14 years 10 days ago
Complexity in scalable computing
f abstraction (hardware) to the highest (people). This issue's theme encompasses this entire spectrum. The lead author of each article resides in the Scalable Computing Resear...
Damian W. I. Rouson
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
14 years 10 days ago
A performance tuning methodology with compiler support
We have developed an environment, based upon robust, existing, open source software, for tuning applications written using MPI, OpenMP or both. The goal of this effort, which inte...
Oscar Hernandez, Barbara M. Chapman, Haoqiang Jin
SP
2008
IEEE
159views Security Privacy» more  SP 2008»
14 years 10 days ago
Inferring neuronal network connectivity from spike data: A temporal data mining approach
Abstract. Understanding the functioning of a neural system in terms of its underlying circuitry is an important problem in neuroscience. Recent developments in electrophysiology an...
Debprakash Patnaik, P. S. Sastry, K. P. Unnikrishn...
SP
2008
IEEE
113views Security Privacy» more  SP 2008»
14 years 10 days ago
Inter-operating grids through Delegated MatchMaking
The grid vision of a single computing utility has yet to materialize: while many grids with thousands of processors each exist, most work in isolation. An important obstacle for t...
Alexandru Iosup, Todd Tannenbaum, Matthew Farrelle...
SP
2008
IEEE
110views Security Privacy» more  SP 2008»
14 years 10 days ago
Software Review
Michael Wester
SP
2008
IEEE
118views Security Privacy» more  SP 2008»
14 years 10 days ago
Cheaper adjoints by reversing address computations
Laurent Hascoët, Jean Utke, Uwe Naumann
SP
2008
IEEE
140views Security Privacy» more  SP 2008»
14 years 10 days ago
Knowledge support and automation for performance analysis with PerfExplorer 2.0
The integration of scalable performance analysis in parallel development tools is difficult. The potential size of data sets and the need to compare results from multiple experime...
Kevin A. Huck, Allen D. Malony, Sameer Shende, Ala...