Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Enhancing HPC security with a user-based firewall
High Performance Computing (HPC) systems traditionally allow their users unrestricted use
of their internal network. While this network is normally controlled enough to guarantee …
of their internal network. While this network is normally controlled enough to guarantee …
[PDF][PDF] Optimizing tunneled grid connectivity across firewalls
Grids today generally assume that concurrent network connections are possible among
many processors attached to high-capacity networks. However, inter-network boundaries …
many processors attached to high-capacity networks. However, inter-network boundaries …
Autonomic computing: implementing the vision
A Ganek - International Workshop on Active Middleware Services, 2003 - computer.org
Computational grids are now mainstream facilities for e-research worldwide. While
enterprise grids exist within organizations, national grids have become common, usually …
enterprise grids exist within organizations, national grids have become common, usually …
Adapting grid applications to safety using fault-tolerant methods: Design, implementation and evaluations
Grid applications have been prone to encountering problems such as failures or malicious
attacks during execution in recent years, due to their distributed and large-scale features …
attacks during execution in recent years, due to their distributed and large-scale features …
Authentication of remote host via closed ports
JB Jennings, K Kekessie - US Patent 8,826,014, 2014 - Google Patents
The present invention addresses the deficiencies of the art in respect to authentication and
provides a novel and non obvious method, system and apparatus for authenticating a client …
provides a novel and non obvious method, system and apparatus for authenticating a client …
REMUS: a rerouting and multiplexing system for Grid connectivity across firewalls
The Grid provides unique opportunities for high-performance computing through distributed
applications that execute over multiple remote resources. Participating institutions can form …
applications that execute over multiple remote resources. Participating institutions can form …
TCP-AuthN: TCP inline authentication to enhance network security in Grid environments
J Wiebelitz, C Kunz, S Piger… - 2009 Eighth International …, 2009 - ieeexplore.ieee.org
To secure communication in Grids many efforts have been made regarding authentication
and authorization. Due to some application requirements it is up to now recommended to …
and authorization. Due to some application requirements it is up to now recommended to …
Secure service-oriented grid computing with public virtual worker nodes
Cloud computing uses virtualization technologies to offer a non-shared use rental of
computer resources with publicly accessible worker nodes. However, unlike grid computing …
computer resources with publicly accessible worker nodes. However, unlike grid computing …
Method of unblocking external computer systems in a computer network infrastructure, distributed computer network having such a computer network infrastructure as …
HJ Claes, A Hosfeld - US Patent 10,313,305, 2019 - Google Patents
METHOD OF UNBLOCKING EXTERNAL complicated or even impossible, because the
external com COMPUTER SYSTEMS IN A COMPUTER puter system may be secured per se …
external com COMPUTER SYSTEMS IN A COMPUTER puter system may be secured per se …
Transparent identity-based firewall transition for eScience
J Wiebelitz, S Piger, C Kunz… - 2009 5th IEEE …, 2009 - ieeexplore.ieee.org
As new concepts for eSciene like grid computing and cloud computing tend to leave the
research phase and develop towards production quality, the security eventually moves into …
research phase and develop towards production quality, the security eventually moves into …