Secure Power Grid Simulation on Cloud
暂无分享,去创建一个
[1] Alexandru Iosup,et al. Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[2] Kun Liu,et al. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.
[3] Dimitris Achlioptas,et al. Database-friendly random projections , 2001, PODS.
[4] Uta Dresdner,et al. Cloud Computing Methodology Systems And Applications , 2016 .
[5] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[6] Eugene H. Spafford,et al. Secure outsourcing of scientific computations , 2001, Adv. Comput..
[7] John Chilton,et al. Does IC design have a future in the clouds? , 2010, Design Automation Conference.
[8] Marty Humphrey,et al. A quantitative analysis of high performance computing with Amazon's EC2 infrastructure: The death of the local cluster? , 2009, 2009 10th IEEE/ACM International Conference on Grid Computing.
[9] Yousef Saad,et al. Iterative methods for sparse linear systems , 2003 .
[10] Cong Wang,et al. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations , 2013, IEEE Transactions on Parallel and Distributed Systems.
[11] Hasmukh Ranjan. Cloud computing and EDA: Is cloud technology ready for verification … (and is verification ready for cloud)? , 2011, Proceedings of 2011 International Symposium on VLSI Design, Automation and Test.
[12] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[13] Yici Cai,et al. PowerRush : Efficient transient simulation for power grid analysis , 2012, 2012 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[14] Chung-Kuan Cheng,et al. MATEX: A distributed framework for transient simulation of power distribution networks , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[15] Philippe Olivier Alexandre Navaux,et al. High Performance Computing in the cloud: Deployment, performance and cost efficiency , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[16] Philip Q Hanser. Applied Optimization: Formulation and Algorithms for Engineering Systems (Baldick, R.; 2006) , 2008 .
[17] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[18] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[19] Erkki Oja,et al. Independent component analysis: algorithms and applications , 2000, Neural Networks.
[20] Shang-Hua Teng,et al. Smoothed Analysis of the Condition Numbers and Growth Factors of Matrices , 2003, SIAM J. Matrix Anal. Appl..
[21] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[22] Farid N. Najm,et al. Circuit Simulation , 2010 .
[23] Neil Genzlinger. A. and Q , 2006 .
[24] Osmar R. Zaïane,et al. A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration , 2007, Comput. Secur..
[25] Martin Burtscher,et al. FPC: A High-Speed Compressor for Double-Precision Floating-Point Data , 2009, IEEE Transactions on Computers.
[26] Jia Wang,et al. Parallel forward and back substitution for efficient power grid simulation , 2012, 2012 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[27] Rajeev Muralidhar,et al. Experiences with a Private Enterprise Cloud: Providing Fault Tolerance and High Availability for Interactive EDA Applications , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.