• Publications
  • Influence
Cryptographic solution to a problem of access control in a hierarchy
Assume t h a t the users of a c o m p u t e r (or c o M m m u n i c a t i o n ) s y s t e m are d iv ided in to a n u m b e r of d i s jo in sets, /_}1, U2, U3, U4, U5, U6, U7. Expand
  • 583
  • 67
  • Open Access
Design and analysis of parallel algorithms
Kurskod: 5DV050 Inrättad: 2012-02-29 Reviderad av: teknisk-naturvetenskapliga fakultetsnämnden Kursplan giltig från: 2012, vecka 10 Ansvarig enhet: Inst för datavetenskap SCB-ämnesrubrik: Informatik/Data systemvetenskapsrubrik. Expand
  • 727
  • 51
  • Open Access
Scheduling Algorithms for Grid Computing: State of the Art and Open Problems
In this paper, the state of current research on scheduling algorithms for Grid computing is surveyed and open problems will be discussed. Expand
  • 486
  • 45
  • Open Access
Parallel computation: models and methods
  • S. Akl
  • Computer Science
  • 1 March 1997
1. Introduction2. Models of Computation3. Combinational Circuits4. Parallel Prefix Computation5. Divide and Conquer6. Pointer-Based Data Structures7. Linear Arrays8. Meshes and Related Models9.Expand
  • 348
  • 36
  • Open Access
A Fast Convex Hull Algorithm
  • 129
  • 15
On the Power of Arrays with Reconfigurable Optical Buses
  • 30
  • 10
Matrix Operations Using Arrays with Reconfigurable Optical Buses*
This paper examines the possibility of implementing matrix operations on an array with reconfigurable optical buses (AROB). Expand
  • 70
  • 9
Parallel computational geometry
Models of parallel computation convex hull intersection problems geometric searching visibility and separability nearest neighbours Vonoroi diagrams geometric optimization triangulation of polygons and point sets current trends future directions. Expand
  • 84
  • 8
Optimal Parallel Merging and Sorting Without Memory Conflicts
A parallel algorithm is described for merging two sorted vectors of total length N. The algorithm runs on a shared-memory model of parallel computation that disallows more than one processor to simultaneously read from or write into the same memory location. Expand
  • 95
  • 7
Cryptographic Solution to a Multilevel Security Problem
A scheme based on cryptography is proposed for enforcing multilevel security in a system where hierarchy is represented by a partially ordered set (or poset). Expand
  • 69
  • 5