Sciweavers

1010 search results - page 38 / 202
» Computational Differences between Asymmetrical and Symmetric...
Sort
View
ISPA
2005
Springer
15 years 5 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
SC
2009
ACM
15 years 6 months ago
Scalable computing with parallel tasks
Recent and future parallel clusters and supercomputers use SMPs and multi-core processors as basic nodes, providing a huge amount of parallel resources. These systems often have h...
Jörg Dümmler, Thomas Rauber, Gudula R&uu...
DFMA
2005
IEEE
100views Multimedia» more  DFMA 2005»
15 years 5 months ago
Mobile Computing to Facilitate Interaction in Lectures and Meetings
The Campus Mobile project explored how PDAs and innovative interfaces can improve interaction during lectures and in small meetings. These mobile computers (small PCs or PDAs) are...
Isabelle M. Demeure, Claudie Faure, Eric Lecolinet...
IPPS
1999
IEEE
15 years 4 months ago
The Impact of Memory Hierarchies on Cluster Computing
Using off-the-shelf commodity workstations and PCs to build a cluster for parallel computing has become a common practice. A choice of a cost-effective cluster computing platform ...
Xing Du, Xiaodong Zhang
ICPP
2006
IEEE
15 years 5 months ago
Parallel Algorithms for Evaluating Centrality Indices in Real-world Networks
This paper discusses fast parallel algorithms for evaluating several centrality indices frequently used in complex network analysis. These algorithms have been optimized to exploi...
David A. Bader, Kamesh Madduri