Sciweavers

17129 search results - page 76 / 3426
» Applied Computing
Sort
View
EUROPAR
2007
Springer
15 years 4 months ago
Compositional Approach Applied to Loop Specialization
An optimizing compiler has a hard time to generate a code which will perform at top speed for an arbitrary data set size. In general, the low level optimization process must take i...
Lamia Djoudi, Jean-Thomas Acquaviva, Denis Barthou
SIGMETRICS
2006
ACM
116views Hardware» more  SIGMETRICS 2006»
15 years 3 months ago
Applying architectural vulnerability Analysis to hard faults in the microprocessor
In this paper, we present a new metric, Hard-Fault Architectural Vulnerability Factor (H-AVF), to allow designers to more effectively compare alternate hard-fault tolerance scheme...
Fred A. Bower, Derek Hower, Mahmut Yilmaz, Daniel ...
SWS
2004
ACM
15 years 3 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
DEXAW
2003
IEEE
137views Database» more  DEXAW 2003»
15 years 3 months ago
Applying the Semantic Web Layers to Access Control
The Semantic Web, also known as the Web of meaning, is considered the new generation of the Web. Its objective is to enable computers and people to work in cooperation. A requisit...
Mariemma Inmaculada Yagüe del Valle, Antonio ...
PADS
2000
ACM
15 years 2 months ago
Applying parallel discrete event simulation to network emulation
The simulation of wide area computer networks is one area where the benefits of parallel simulation have been clearly demonstrated. Here we present a description of a system that...
Rob Simmonds, Russell Bradford, Brian Unger