Sciweavers

947 search results - page 20 / 190
» Analysis of Techniques to Improve Protocol Processing Latenc...
Sort
View
JCS
2010
80views more  JCS 2010»
14 years 8 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
EUROPAR
2000
Springer
15 years 4 months ago
Cache Remapping to Improve the Performance of Tiled Algorithms
With the increasing processing power, the latency of the memory hierarchy becomes the stumbling block of many modern computer architectures. In order to speed-up the calculations, ...
Kristof Beyls, Erik H. D'Hollander
DATE
2010
IEEE
121views Hardware» more  DATE 2010»
15 years 6 months ago
Properties of and improvements to time-domain dynamic thermal analysis algorithms
—Temperature has a strong influence on integrated circuit (IC) performance, power consumption, and reliability. However, accurate thermal analysis can impose high computation co...
Xi Chen, Robert P. Dick, Li Shang
CORR
2011
Springer
227views Education» more  CORR 2011»
14 years 8 months ago
Message Structures: a modelling technique for information systems analysis and design
Despite the increasing maturity of model-driven development (MDD), some research challenges remain open in the field of information systems (IS). For instance, there is a need to i...
Sergio España, Arturo González, Osca...
WWW
2005
ACM
16 years 1 months ago
Data versioning techniques for internet transaction management
An Internet transaction is a transaction that involves communication over the Internet using standard Internet protocols such as HTTPS. Such transactions are widely used in Intern...
Ramkrishna Chatterjee, Gopalan Arun