• Publications
  • Influence
Cryptographic solution to a problem of access control in a hierarchy
tl;dr
Assume t h a t the users of a c o m p u t e r (or c o M m m u n i c a t i o n ) s y s t e m are d iv ided in to a n u m b e r of d i s jo in sets, /_}1, U2, U3, U4, U5, U6, U7. Expand
  • 583
  • 67
  • Open Access
Design and analysis of parallel algorithms
tl;dr
Kurskod: 5DV050 Inrättad: 2012-02-29 Reviderad av: teknisk-naturvetenskapliga fakultetsnämnden Kursplan giltig från: 2012, vecka 10 Ansvarig enhet: Inst för datavetenskap SCB-ämnesrubrik: Informatik/Data systemvetenskapsrubrik. Expand
  • 727
  • 51
  • Open Access
Scheduling Algorithms for Grid Computing: State of the Art and Open Problems
tl;dr
In this paper, the state of current research on scheduling algorithms for Grid computing is surveyed and open problems will be discussed. Expand
  • 486
  • 45
  • Open Access
Parallel computation: models and methods
  • S. Akl
  • Computer Science
  • 1 March 1997
1. Introduction2. Models of Computation3. Combinational Circuits4. Parallel Prefix Computation5. Divide and Conquer6. Pointer-Based Data Structures7. Linear Arrays8. Meshes and Related Models9.Expand
  • 348
  • 36
  • Open Access
A Fast Convex Hull Algorithm
  • 129
  • 15
On the Power of Arrays with Reconfigurable Optical Buses
  • 30
  • 10
Matrix Operations Using Arrays with Reconfigurable Optical Buses*
tl;dr
This paper examines the possibility of implementing matrix operations on an array with reconfigurable optical buses (AROB). Expand
  • 70
  • 9
Parallel computational geometry
tl;dr
Models of parallel computation convex hull intersection problems geometric searching visibility and separability nearest neighbours Vonoroi diagrams geometric optimization triangulation of polygons and point sets current trends future directions. Expand
  • 84
  • 8
Optimal Parallel Merging and Sorting Without Memory Conflicts
tl;dr
A parallel algorithm is described for merging two sorted vectors of total length N. The algorithm runs on a shared-memory model of parallel computation that disallows more than one processor to simultaneously read from or write into the same memory location. Expand
  • 95
  • 7
Cryptographic Solution to a Multilevel Security Problem
tl;dr
A scheme based on cryptography is proposed for enforcing multilevel security in a system where hierarchy is represented by a partially ordered set (or poset). Expand
  • 69
  • 5