Search For:

Displaying 1-7 out of 7 total
Cloud Computing Roundtable
Found in: IEEE Security and Privacy
By Eric Grosse, John Howie, James Ransome, Jim Reavis, Steve Schmidt
Issue Date:November 2010
pp. 17-23
As part of this special issue on cloud computing, guest editors Iván Arce and Anup Ghosh put together a roundtable discussion so readers can hear about cloud computing security from those who are on the front lines, providing services and looking at the re...
 
Netlib and NA-Net: Building a Scientific Computing Community
Found in: IEEE Annals of the History of Computing
By Jack Dongarra,Gene H. Golub,Eric Grosse,Cleve Moler,Keith Moore
Issue Date:April 2008
pp. 30-41
Two resources evolved in the early 1980s to serve the needs of the scientific computing community. These resources were Netlib, a software repository that facilitated distribution of public-domain software, and NA-Net, a file of analysts' contact informati...
 
Authentication at Scale
Found in: IEEE Security & Privacy
By Eric Grosse,Mayank Upadhyay
Issue Date:January 2013
pp. 15-22
Like many in the industry, the authors believe passwords and simple bearer tokens, such as cookies, are no longer sufficient to keep users safe. Google employs a base level of sophisticated server-side technologies, such as SSL and risk analysis, to protec...
 
Guest Editors' Introduction: Network Processors for Future High-End Systems and Applications
Found in: IEEE Micro
By Ioannis Papaefstathiou, Nikos A. Nikolaou, Bharat Doshi, Eric Grosse
Issue Date:September 2004
pp. 7-9
No summary available.
 
Network Programming and CSE
Found in: Computing in Science and Engineering
By Eric Grosse
Issue Date:June 1996
pp. 40-41
No summary available.
 
Self-adapting Fortran 77 machine constants: comment on Algorithm 528
Found in: ACM Transactions on Mathematical Software (TOMS)
By David M. Gay, Eric Grosse
Issue Date:March 1988
pp. 123-126
This note discusses user dissatisfaction with the need to uncomment data statements in Algorithm 528, comments on alternative approaches tried by the community, and proposes a solution that is both automatic and safe.
     
Repository mirroring
Found in: ACM Transactions on Mathematical Software (TOMS)
By Eric Grosse
Issue Date:March 1988
pp. 89-97
Distributed administration of network repositories demands a low-overhead procedure for cooperating repositories around the world to ensure they hold identical contents. Netlib has adopted some refinements on the widespread scheme of anonymous ftp and s-R....
     
 1