Sciweavers

2339 search results - page 139 / 468
» A student-directed computing community
Sort
View
PKC
1999
Springer
94views Cryptology» more  PKC 1999»
15 years 6 months ago
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor
Public-key implementers often face strong hardware-related constraints. In particular, modular operations required in most cryptosystems generally constitute a computational bottle...
Pascal Paillier
CHI
2007
ACM
16 years 2 months ago
Environmental sustainability and interaction
By its nature, the discipline of human computer interaction must take into consideration the issues that are most pertinent to humans. We believe that the CHI community faces an u...
Jennifer Mankoff, Eli Blevis, Alan Borning, Batya ...
GROUP
2009
ACM
15 years 8 months ago
The dissemination of knowledge management
Our study on a community of knowledge management (KM) practitioners in the aerospace industry reveals challenges in the dissemination of KM concepts and tools. In this paper, we i...
Hiroko Wilensky, David F. Redmiles, Norman Makoto ...
127
Voted
ESCIENCE
2006
IEEE
15 years 5 months ago
The Design and Implementation of the Transatlantic Mission-Oriented Production and Experimental Networks
In this paper we present the design and implementation of the mission-oriented USLHCNet for HEP research community and the UltraLight network testbed. The design philosophy for th...
Harvey B. Newman, Dimitri Bourilkov, Julian J. Bun...
115
Voted
INFOCOM
2009
IEEE
15 years 8 months ago
A Queueing Model Framework of PCE-Based Inter-Area Path Computation
Abstract—Path computation elements (PCE’s) are used to compute end-to-end paths across multiple areas. Multiple PCE’s may be dedicated to each area to provide sufficient path...
Juanjuan Yu, Yue He, Kai Wu, Marco Tacca, Andrea F...