High performance computing is one of the most exciting technologies used in solving real-world problems in computational science and engineering. It is expected that the years to come will witness a proliferation of the use of parallel and distributed systems. High performance computing plays an important role in determining and shaping research and development activities in numerous academic and industrial branches, especially when the solution of large-scale problems must cope with ever-increasingly harder requirements for computing time and storage space. This special workshop is an international forum that brings together researchers, practitioners, and students working in the areas of computer architecture, system and network, algorithms, and applications to present, discuss, and exchange ideas, results, work in progress, and experience of research and practice in the area of high performance computing for science and engineering applications.The workshop received many submissions representing 7 countries. All submissions were carefully reviewed by our committee members and external reviewers. In order to allocate as many papers as possible and also keep the high quality of the workshop, we finally decided to accept 14 papers for oral technical presentation at the workshop. We believe these papers and their presentation will provide novel ideas and the state-of-the-art techniques as well as stimulate future research activities in the area of high performance computing for science and engineering applications.The program for this workshop is the result of hard and excellent work of many people, including the authors, the external reviewers, and the program committee members. We would like to express our sincere appreciation to all of them for their cooperation in completing the workshop program under a tight schedule. We also want to thank Fusun Ozguner and Tim Pinkston, ICPP-2006 Workshop Co-Chairs, for encouraging and helping the inclusion of HPSEC-06 in ICPP-06.
Wireless networks have experienced an explosive growth during the last few years. Nowadays, there is a large variety of networks spanning from the well-known cellular networks to non-infrastructure wireless networks such as mobile ad hoc networks and sensor networks. Technologies such as Near Field Communication, RFID and other wireless sensors are already part of our everyday life.
You are welcome to join the 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP-08), which is to be held in conjunction with the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-08) during 17-20 December 2008. This symposium aims at bringing together researchers and practitioners in the world working on trust, security, privacy, and related issues such as technical, social and cultural implications for pervasive devices, services, networks, applications and systems, and providing a forum for them to present and discuss emerging ideas and trends in this highly challenging research area.While TSP-08 is in its first year, we got 139 high-quality papers. Each paper has been carefully reviewed by at least 3 reviewers from the program committee members and we selected around 60 papers for presentation. We congratulate the authors of accepted papers and we regret that a lot of high quality submissions could not be included in the proceedings for publication.On behalf of the organizers and the program committee members of TSP-08, we appreciate all the authors who have submitted their papers to this symposium. We are grateful that Prof. Bhavani Thuraisingham (The University of Texas at Dallas, USA), accepted our invitation for the keynote speech entitled "Building Trustworthy Semantic Webs". We would like to thank the program committee members for their great efforts in reviewing the papers. We would also like to thank Prof. Robert C. H. Hsu (Chung Hua University, Taiwan) and Prof. Keqiu Li (Dalian University of Technology, China), who took the role of publicity co-chairs and distributed the Call for Papers widely and frequently.
Satisfying user requirements for trust, security and privacy in an efficient way is one of the first considerations for almost all emerging applications, using emerging technologies such as pervasive computing, peer to peer computing, grid computing, cloud computing, virtualization, and mobile and wireless technologies. Challenges arise as emerging applications evolve to provide more scalable and comprehensive services. One of the biggest challenges is that traditional security technologies and measures may not meet user requirements in open, dynamic, heterogeneous, and distributed computing environments. Therefore, we need to build networks and systems in which emerging applications allow users to enjoy more scalable and comprehensive services while preserving trust, security and privacy at the same time.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.