• GQTPAR

  • Referenced in 325 articles [sw07451]
  • Computing a trust region step We propose an algorithm for the problem of minimizing...
  • Ynot

  • Referenced in 35 articles [sw12334]
  • call Ynot, is the added support for computations that may have effects such ... axioms of Ynot form a small trusted computing base which has been formally justified...
  • ORBIT

  • Referenced in 39 articles [sw20552]
  • optimization by radial basis function interpolation in trust-regions. We present a new derivative-free ... unconstrained local optimization of computationally expensive functions. A trust-region framework using interpolating Radial Basis...
  • KELLEY

  • Referenced in 631 articles [sw04829]
  • devoted to line-search and trust-region methods, which are used to globalize convergence ... evaluation of the objective function involves computer simulations. In such cases the noise often introduces...
  • FairplayMP

  • Referenced in 16 articles [sw11926]
  • parties run a joint computation that emulates a trusted party which receives the inputs from...
  • OEuf

  • Referenced in 6 articles [sw27482]
  • OCaml runtime are all in the trusted computing base (TCB). In some sense, the runtime...
  • VIFF

  • Referenced in 15 articles [sw05804]
  • secure multi-party computations (SMPC). Players, who do not trust each other, participate...
  • TRICE

  • Referenced in 46 articles [sw05197]
  • exploit trust-region techniques for equality-constrained optimization. Thus, they allow the computation...
  • CONDOR

  • Referenced in 24 articles [sw02490]
  • Direct, parallel Optimization using trust Region method for high-computing load function). The experimental results...
  • TRON

  • Referenced in 113 articles [sw04714]
  • TRON is a trust region Newton method for the solution of large bound-constrained optimization ... direction, and a projected search to compute the step. The use of projected searches...
  • TCB

  • Referenced in 5 articles [sw13591]
  • Carrying Code (PCC) and other applications in computer security require machine-checkable proofs of properties ... amount of code that must be explicitly trusted is very small: it consists ... safety proofs. We show that the Trusted Computing Base (TCB) in such a system...
  • Rocksalt

  • Referenced in 5 articles [sw23353]
  • faster, and has a much reduced trusted computing base when compared to Google’s original...
  • Sancus

  • Referenced in 3 articles [sw24321]
  • networked devices with a zero-software trusted computing base. In this paper we propose Sancus ... other software modules that they choose to trust. The most distinguishing feature of Sancus ... infrastructural software on the device. The Trusted Computing Base (TCB) on the device is only...
  • ARMor

  • Referenced in 4 articles [sw18275]
  • guarantees and has an exceptionally small trusted computing base - there is no trusted compiler, binary...
  • SuLQ

  • Referenced in 128 articles [sw11355]
  • consider a statistical database in which a trusted administrator introduces noise to the query responses ... required for privacy. Second, we examine the computational power of the SuLQ primitive. We show...
  • GridSec

  • Referenced in 4 articles [sw01927]
  • GridSec: Trusted grid computing with security binding and self-defense against network worms and DDoS ... Grid application. We report new developments in trust modeling, security-binding methodology, and defense architecture ... challenging research issues to achieve secure Grid computing effectively in an open Internet environment...
  • VeriCount

  • Referenced in 1 article [sw25455]
  • using hardware and software isolation. In cloud computing, where clients are billed based ... combines hardware-based isolation guarantees from trusted computing mechanisms and software fault isolation techniques ... VeriCount leverages security features present in trusted computing solutions, such as Intel SGX, to measure ... lines of code to the trusted computing base. Lastly, it generates highly accurate, fine-grained...
  • Me-services

  • Referenced in 8 articles [sw01399]
  • networking technologies, will help realize the pervasive computing paradigm. In this paper, we present ... composition, data management, and trust based security in pervasive computing environments...
  • QUALEX

  • Referenced in 51 articles [sw04742]
  • heuristic is developed. In contrast to usual trust region methods, it regards not only ... publicly available software package QUALEX-MS. Computational experiments indicate that the algorithm is exact...
  • Cogent

  • Referenced in 2 articles [sw18522]
  • systems is to use a minimal trusted computing base (TCB), and formally prove its correctness...