Sciweavers

1415 search results - page 119 / 283
» Can Parallel Algorithms Enhance Serial Implementation
Sort
View
IWMM
2010
Springer
211views Hardware» more  IWMM 2010»
15 years 4 months ago
Concurrent, parallel, real-time garbage-collection
With the current developments in CPU implementations, it becomes obvious that ever more parallel multicore systems will be used even in embedded controllers that require real-time...
Fridtjof Siebert
JSAC
2008
95views more  JSAC 2008»
15 years 28 days ago
Cognitive Medium Access: Constraining Interference Based on Experimental Models
In this paper we design a cognitive radio that can coexist with multiple parallel WLAN channels while abiding by an interference constraint. The interaction between both systems is...
Stefan Geirhofer, Lang Tong, Brian M. Sadler
ESCIENCE
2006
IEEE
15 years 6 months ago
Applying Advance Reservation to Increase Predictability of Workflow Execution on the Grid
ct In this paper we present an extension to devise and implement advance reservation as part of the scheduling and resource management services of the ASKALON Grid application deve...
Marek Wieczorek, Mumtaz Siddiqui, Alex Villaz&oacu...
140
Voted
PLDI
2012
ACM
13 years 4 months ago
Parallelizing top-down interprocedural analyses
Modularity is a central theme in any scalable program analysis. The core idea in a modular analysis is to build summaries at procedure boundaries, and use the summary of a procedu...
Aws Albarghouthi, Rahul Kumar, Aditya V. Nori, Sri...
117
Voted
CTRSA
2009
Springer
142views Cryptology» more  CTRSA 2009»
15 years 9 months ago
Attacks on the DECT Authentication Mechanisms
Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic al...
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Phi...