Sciweavers

872 search results - page 140 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
RTAS
1995
IEEE
15 years 4 months ago
ControlShell: component-based real-time programming
Real-time system software is notoriously hard to share and reuse. This paper walks through the methodology and application of ControlShell, a component-based programming system re...
Stanley A. Schneider, Vincent W. Chen, Gerardo Par...
SC
1995
ACM
15 years 4 months ago
Multicast Virtual Topologies for Collective Communication in MPCs and ATM Clusters
This paper de nes and describes the properties of a multicast virtual topology, the M-array, and a resource-ecient variation, the REM-array. It is shown how several collective op...
Yih Huang, Chengchang Huang, Philip K. McKinley
SIGCOMM
1995
ACM
15 years 4 months ago
Design, Implementation, and Evaluation of a Software-Based Real-Time Ethernet Protocol
Distributedmultimedia applicationsrequire performanceguarantees from the underlying network subsystem. Ethernet has been the dominant local area network architecture in the last d...
Chitra Venkatramani, Tzi-cker Chiueh
CHES
2008
Springer
132views Cryptology» more  CHES 2008»
15 years 3 months ago
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n 1-bit execution units operating in...
Philipp Grabher, Johann Großschädl, Dan...
CIKM
2005
Springer
15 years 3 months ago
Fast on-line index construction by geometric partitioning
Inverted index structures are the mainstay of modern text retrieval systems. They can be constructed quickly using off-line mergebased methods, and provide efficient support for ...
Nicholas Lester, Alistair Moffat, Justin Zobel