Sciweavers

1010 search results - page 17 / 202
» Computational Differences between Asymmetrical and Symmetric...
Sort
View
PDP
2006
IEEE
15 years 5 months ago
Comparing Commodity SMP System Software with a Matrix Multiplication Benchmark
Commodity symmetric multiprocessors (SMPs), though originally intended for transaction processing, because of their availability, are now used for numerical analysis applications ...
Georgios Tsilikas, Martin Fleury
WOA
2010
14 years 9 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
TIP
2010
164views more  TIP 2010»
14 years 6 months ago
A Marked Point Process for Modeling Lidar Waveforms
Lidar waveforms are 1D signals representing a train of echoes caused by reflections at different targets. Modeling these echoes with the appropriate parametric function is useful ...
Clément Mallet, Florent Lafarge, Michel Rou...
MSS
2003
IEEE
113views Hardware» more  MSS 2003»
15 years 5 months ago
Design and Implementation of Multiple Addresses Parallel Transmission Architecture for Storage Area Network
In this paper, we present a parallel transmission architecture for SAN. By using two schedulers on the destination and source addresses of packets, the load of multiple data flows...
Bin Meng, Patrick B. T. Khoo, T. C. Chong
ADHOCNOW
2010
Springer
15 years 1 months ago
Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks
Designing message integrity schemes for data aggregation is an imperative problem for securing wireless sensor networks. In this paper, we propose three secure aggregation schemes ...
Zhijun Li, Guang Gong