• GQTPAR

  • Referenced in 303 articles [sw07451]
  • Computing a trust region step We propose an algorithm for the problem of minimizing...
  • Ynot

  • Referenced in 35 articles [sw12334]
  • call Ynot, is the added support for computations that may have effects such ... axioms of Ynot form a small trusted computing base which has been formally justified...
  • ORBIT

  • Referenced in 30 articles [sw20552]
  • optimization by radial basis function interpolation in trust-regions. We present a new derivative-free ... unconstrained local optimization of computationally expensive functions. A trust-region framework using interpolating Radial Basis...
  • KELLEY

  • Referenced in 589 articles [sw04829]
  • devoted to line-search and trust-region methods, which are used to globalize convergence ... evaluation of the objective function involves computer simulations. In such cases the noise often introduces...
  • TRICE

  • Referenced in 46 articles [sw05197]
  • exploit trust-region techniques for equality-constrained optimization. Thus, they allow the computation...
  • CONDOR

  • Referenced in 23 articles [sw02490]
  • Direct, parallel Optimization using trust Region method for high-computing load function). The experimental results...
  • TRON

  • Referenced in 108 articles [sw04714]
  • TRON is a trust region Newton method for the solution of large bound-constrained optimization ... direction, and a projected search to compute the step. The use of projected searches...
  • VIFF

  • Referenced in 12 articles [sw05804]
  • secure multi-party computations (SMPC). Players, who do not trust each other, participate...
  • Sancus

  • Referenced in 3 articles [sw24321]
  • networked devices with a zero-software trusted computing base. In this paper we propose Sancus ... other software modules that they choose to trust. The most distinguishing feature of Sancus ... infrastructural software on the device. The Trusted Computing Base (TCB) on the device is only...
  • FairplayMP

  • Referenced in 10 articles [sw11926]
  • parties run a joint computation that emulates a trusted party which receives the inputs from...
  • TCB

  • Referenced in 4 articles [sw13591]
  • Carrying Code (PCC) and other applications in computer security require machine-checkable proofs of properties ... amount of code that must be explicitly trusted is very small: it consists ... safety proofs. We show that the Trusted Computing Base (TCB) in such a system...
  • ARMor

  • Referenced in 3 articles [sw18275]
  • guarantees and has an exceptionally small trusted computing base - there is no trusted compiler, binary...
  • OEuf

  • Referenced in 3 articles [sw27482]
  • OCaml runtime are all in the trusted computing base (TCB). In some sense, the runtime...
  • Rocksalt

  • Referenced in 3 articles [sw23353]
  • faster, and has a much reduced trusted computing base when compared to Google’s original...
  • GridSec

  • Referenced in 4 articles [sw01927]
  • GridSec: Trusted grid computing with security binding and self-defense against network worms and DDoS ... Grid application. We report new developments in trust modeling, security-binding methodology, and defense architecture ... challenging research issues to achieve secure Grid computing effectively in an open Internet environment...
  • SuLQ

  • Referenced in 119 articles [sw11355]
  • consider a statistical database in which a trusted administrator introduces noise to the query responses ... required for privacy. Second, we examine the computational power of the SuLQ primitive. We show...
  • VeriCount

  • Referenced in 1 article [sw25455]
  • using hardware and software isolation. In cloud computing, where clients are billed based ... combines hardware-based isolation guarantees from trusted computing mechanisms and software fault isolation techniques ... VeriCount leverages security features present in trusted computing solutions, such as Intel SGX, to measure ... lines of code to the trusted computing base. Lastly, it generates highly accurate, fine-grained...
  • Me-services

  • Referenced in 8 articles [sw01399]
  • networking technologies, will help realize the pervasive computing paradigm. In this paper, we present ... composition, data management, and trust based security in pervasive computing environments...
  • QUALEX

  • Referenced in 49 articles [sw04742]
  • heuristic is developed. In contrast to usual trust region methods, it regards not only ... publicly available software package QUALEX-MS. Computational experiments indicate that the algorithm is exact...
  • ODRPACK

  • Referenced in 21 articles [sw00649]
  • algorithm implemented is an efficient and stable trust region Levenberg-Marquardt procedure that exploits ... structure of the problem so that the computational cost per iteration is equal to that...