-
3
-
-
85093854946
-
-
Java port of elefunt. http://www.math.utah.edu/ beebe/software/java/.
-
Java port of elefunt
-
-
-
4
-
-
85093847694
-
-
The Great Internet Prime Mersenne Search: GIMPS
-
The Great Internet Prime Mersenne Search: GIMPS. http://www.mersenne.org/.
-
-
-
-
8
-
-
85093849589
-
Security aspects of napster and gnutella
-
Aug
-
S. Bellovin. Security aspects of napster and gnutella. In USENIX Security Symposium, Aug. 2000.
-
(2000)
USENIX Security Symposium
-
-
Bellovin, S.1
-
9
-
-
0031269854
-
Disco: Running commodity operating systems on scalable multiprocessors
-
E. Bugnion, S. Devine, K. Govil, and M. Rosenblum. Disco: Running commodity operating systems on scalable multiprocessors. ACM Transactions on Computer Systems, 15(4):412- 447, 1997.
-
(1997)
ACM Transactions on Computer Systems
, vol.15
, Issue.4
, pp. 412-447
-
-
Bugnion, E.1
Devine, S.2
Govil, K.3
Rosenblum, M.4
-
10
-
-
85092890026
-
Certifying program execution with secure processors
-
May
-
B. Chen and R. Morris. Certifying program execution with secure processors. In USENIX HotOS Workshop, May 2003.
-
(2003)
USENIX HotOS Workshop
-
-
Chen, B.1
Morris, R.2
-
16
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
October
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 19th Symposium on Operating System Principles(SOSP 2003), October 2003.
-
(2003)
Proceedings of the 19th Symposium on Operating System Principles(SOSP 2003)
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
18
-
-
0003339136
-
The digital distributed system security architecture
-
M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson. The digital distributed system security architecture. In Proc. 12th NIST-NCSC National Computer Security Conference, pages 305-319, 1989.
-
(1989)
Proc. 12th NIST-NCSC National Computer Security Conference
, pp. 305-319
-
-
Gasser, M.1
Goldstein, A.2
Kaufman, C.3
Lampson, B.4
-
19
-
-
0034449536
-
Implementing a distributed firewall
-
S. Ioannidis, A. D. Keromytis, S. M. Bellovin, and J. M. Smith. Implementing a distributed firewall. In ACM Conference on Computer and Communications Security, pages 190-199, 2000.
-
(2000)
ACM Conference on Computer and Communications Security
, pp. 190-199
-
-
Ioannidis, S.1
Keromytis, A. D.2
Bellovin, S. M.3
Smith, J. M.4
-
20
-
-
0003243695
-
Seti@home - massively distributed computing for SETI
-
E. Korpela, D. Werthimer, D. Anderson, J. Cobb, and M. Lebofsky. Seti@home - massively distributed computing for SETI. Computing Science and Engineering, 3(1), 2001.
-
(2001)
Computing Science and Engineering
, vol.3
, Issue.1
-
-
Korpela, E.1
Werthimer, D.2
Anderson, D.3
Cobb, J.4
Lebofsky, M.5
-
22
-
-
10044261240
-
-
Sept
-
D. Molnar. The SETI@home problem. http://www.acm.org/crossroads/columns/ onpatrol/september2000.html, Sept. 2000.
-
(2000)
The SETI@home problem
-
-
Molnar, D.1
-
24
-
-
84958983468
-
A scalable architecture for proofcarrying code
-
G. C. Necula. A scalable architecture for proofcarrying code. Lecture Notes in Computer Science, 2024:21+, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2024
, pp. 21
-
-
Necula, G. C.1
-
27
-
-
84887517069
-
Beta hairpin folding simulations in atomistic detail using an implicit solvent model
-
B. Zagrovic, E. Sorin, and V. Pande. Beta hairpin folding simulations in atomistic detail using an implicit solvent model. Journal of Molecular Biology, 317(4), 2002.
-
(2002)
Journal of Molecular Biology
, vol.317
, Issue.4
-
-
Zagrovic, B.1
Sorin, E.2
Pande, V.3
|