Sciweavers

2756 search results - page 93 / 552
» Computation-Centric Memory Models
Sort
View
ASIACRYPT
2003
Springer
15 years 9 months ago
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). ...
Dwaine E. Clarke, Srinivas Devadas, Marten van Dij...
SSS
2010
Springer
15 years 2 months ago
"Slow Is Fast" for Wireless Sensor Networks in the Presence of Message Losses
Abstract. Transformations from shared memory model to wireless sensor networks (WSNs) quickly become inefficient in the presence of prevalent message losses in WSNs, and this prohi...
Mahesh Arumugam, Murat Demirbas, Sandeep S. Kulkar...
PVM
2007
Springer
15 years 10 months ago
Parallelizing Dense Linear Algebra Operations with Task Queues in
llc is a language based on C where parallelism is expressed using compiler directives. The llc compiler produces MPI code which can be ported to both shared and distributed memory ...
Antonio J. Dorta, José M. Badía, Enr...
147
Voted
IPPS
2010
IEEE
15 years 2 months ago
Operating system resource management
From the point of view of an operating system, a computer is managed and optimized in terms of the application programming model and the management of system resources. For the TF...
Burton Smith
157
Voted
TACAS
1998
Springer
98views Algorithms» more  TACAS 1998»
15 years 8 months ago
Efficient Modeling of Memory Arrays in Symbolic Ternary Simulation
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory array is replaced with a behavioral model, where the number of symbolic variable...
Miroslav N. Velev, Randal E. Bryant