Sciweavers

1722 search results - page 1 / 345
» Dedication
Sort
View
FSE
1993
Springer
148views Cryptology» more  FSE 1993»
13 years 9 months ago
Design Principles for Dedicated Hash Functions
Abstract. Dedicated hash functions are cryptographically secure compression functions which are designed specifically for hashing. They intend to form a practical alternative for ...
Bart Preneel
IPPS
2006
IEEE
13 years 11 months ago
Dedicated module access in dynamically reconfigurable systems
Modern FPGAs, such as the Xilinx Virtex-II Series, offer the feature of partial and dynamic reconfiguration, allowing to load various hardware configurations (i.e., HW modules) du...
Jens Hagemeyer, Boris Kettelhoit, Mario Porrmann
JPDC
2007
86views more  JPDC 2007»
13 years 5 months ago
Strategies to create platforms for differentiated services from dedicated and opportunistic resources
This paper is proposing a new platform for implementing services in future service oriented architectures. The basic premise of our proposal is that by combining large volume of u...
Shah Asaduzzaman, Muthucumaru Maheswaran
ACISICIS
2008
IEEE
13 years 11 months ago
An Integer Linear Programming Approach for Dedicated Machine Constraint
Dedicated machine constraint is one of the new challenges introduced in photolithography machinery of the semiconductor manufacturing system due to natural bias. Previous research...
Huy Nguyen Anh Pham, Arthur M. D. Shr, Peter P. Ch...
SC
2003
ACM
13 years 10 months ago
Dyn-MPI: Supporting MPI on Non Dedicated Clusters
Distributing data is a fundamental problem in implementing efficient distributed-memory parallel programs. The problem becomes more difficult in environments where the participa...
D. Brent Weatherly, David K. Lowenthal, Mario Naka...