Buscar
Mostrando ítems 1-10 de 57
Security Threats in Volunteer Computing Environments Using the Berkeley Open Infrastructure for Network Computing (BOINC)
(2012-06-01)
Volunteer Computing is a low cost and easy deployable solution for scientific projects that require large amounts of computational power. Volunteer computing public access capabilities comes with several security threats ...
State of the Art for String Analysis and Pattern Search Using CPU and GPU Based Programming
(2012-08-26)
String matching algorithms are an important piece in the network intrusion detection systems. In these systems, the chain coincidence algorithms occupy more than half the CPU process time. The GPU technology has sh ow ed ...