The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment.
Grigorios FragkosKonstantinos XynosAndrew BlythPublished in: ECIW (2005)
Keyphrases
- parallel processing
- distributed processing
- processing speed
- computational power
- pc cluster
- ibm sp
- peer to peer
- parallel computation
- network structure
- data parallelism
- parallel computers
- parallel architectures
- single machine
- computer networks
- computer systems
- electronic circuits
- real time
- cmos image sensor
- tree decomposition
- processing units
- information security
- scheduling problem
- wireless sensor networks
- information systems