Sciweavers

442 search results - page 57 / 89
» A Flexible Generator Architecture for Improving Software Dep...
Sort
View
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
15 years 6 months ago
The Rigorous Implementation of a Fair Exchange Protocol for Non-repudiable Web Service Interactions - a case study
The correct implementation of security protocols is a challenging task. To achieve a high degree of confidence in an implementation, as with any software, ideally one requires bot...
Nick Cook, Paul Robinson, Santosh K. Shrivastava
JMIV
2006
176views more  JMIV 2006»
14 years 11 months ago
Centroidal Voronoi Tessellation Algorithms for Image Compression, Segmentation, and Multichannel Restoration
Centroidal Voronoi tessellations (CVT's) are special Voronoi tessellations for which the generators of the tessellation are also the centers of mass (or means) of the Voronoi ...
Qiang Du, Max Gunzburger, Lili Ju, Xiaoqiang Wang
CF
2010
ACM
15 years 4 months ago
Enabling a highly-scalable global address space model for petascale computing
Over the past decade, the trajectory to the petascale has been built on increased complexity and scale of the underlying parallel architectures. Meanwhile, software developers hav...
Vinod Tipparaju, Edoardo Aprà, Weikuan Yu, ...
JSA
2010
173views more  JSA 2010»
14 years 6 months ago
Hardware/software support for adaptive work-stealing in on-chip multiprocessor
During the past few years, embedded digital systems have been requested to provide a huge amount of processing power and functionality. A very likely foreseeable step to pursue th...
Quentin L. Meunier, Frédéric P&eacut...
VEE
2012
ACM
222views Virtualization» more  VEE 2012»
13 years 7 months ago
Unpicking the knot: teasing apart VM/application interdependencies
Flexible and efficient runtime design requires an understanding of the dependencies among the components internal to the runtime and those between the application and the runtime...
Yi Lin, Stephen M. Blackburn, Daniel Frampton