Sciweavers

8655 search results - page 288 / 1731
» Challenges for Trusted Computing
Sort
View
237
Voted
ICS
2007
Tsinghua U.
15 years 9 months ago
Scheduling FFT computation on SMP and multicore systems
Increased complexity of memory systems to ameliorate the gap between the speed of processors and memory has made it increasingly harder for compilers to optimize an arbitrary code...
Ayaz Ali, S. Lennart Johnsson, Jaspal Subhlok
180
Voted
IPPS
2006
IEEE
15 years 9 months ago
High-performance computing in remotely sensed hyperspectral imaging: the Pixel Purity Index algorithm as a case study
The incorporation of last-generation sensors to airborne and satellite platforms is currently producing a nearly continual stream of high-dimensional data, and this explosion in t...
Antonio Plaza, David Valencia, Javier Plaza
ACMDIS
2006
ACM
15 years 9 months ago
External representations in ubiquitous computing design and the implications for design tools
One challenge for ubiquitous computing is providing appropriate tools for professional designers, thus leading to stronger user-valued applications. Unlike many previous tool-buil...
Steven Dow, T. Scott Saponas, Yang Li, James A. La...
IJNSEC
2006
156views more  IJNSEC 2006»
15 years 3 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed
DIALM
1999
ACM
150views Algorithms» more  DIALM 1999»
15 years 7 months ago
Mobile computing in next generation wireless networks
In this paper, we attempt to describe the evolving status of wireless communications and its impact on the future of mobile computing. We present a historical perspective and eluc...
Prathima Agrawal, David Famolari