Learn More
Clusters of workstations are a promising platform for high-performance computing. Most of such clusters are built of dedicated workstations that cannot be used for other purposes. Even though these clusters offer good price/performance ratio, their costs are not negligible. On the other hand, there exist many idle workstations connected via computer(More)
This paper proposes mechanisms for the protection of high-performance systems that are built of non-dedicated workstations. Such workstations may potentially be under control of malicious users that may gain complete control over the processes running there. The protection is achieved by a careful assignment of processes to computing nodes. If a process(More)
  • 1