Sciweavers

11061 search results - page 323 / 2213
» Computer Architecture
Sort
View
IJNSEC
2008
145views more  IJNSEC 2008»
15 years 4 months ago
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing
Most of the current security architectures for grid systems use conventional public key infrastructure (PKI) to authenticate grid members and to secure resource allocation to thes...
Shengbao Wang, Zhenfu Cao, Haiyong Bao
ISEM
2006
91views more  ISEM 2006»
15 years 4 months ago
Computational experimentations in market and supply-chain co-design: a mixed agent approach
The synthetic environment for analysis and simulations (SEAS) is a computational experimentation environment that mimics real life economies, with multiple interlinked markets, mul...
Alok R. Chaturvedi, Shailendra Raj Mehta, Daniel R...
LCN
1999
IEEE
15 years 8 months ago
An Architecture for Managing QoS-Enabled VPNs over the Internet
This paper describes an architecture for the management of QoS-enabled virtual private networks (VPNs) over the Internet. The architecture focuses on two important issues of VPNs:...
Manuel Günter, Torsten Braun, Ibrahim Khalil
IE
2007
15 years 6 months ago
Observing the learning curve of videogames in architectural design
This paper presents innovative research into the use of videogame environments within architectural design studios. In this context, 3D videogame environments encourage new unders...
Greg More, Andrew Burrow
FPGA
2001
ACM
152views FPGA» more  FPGA 2001»
15 years 9 months ago
A pipelined architecture for partitioned DWT based lossy image compression using FPGA's
Discrete wavelet transformations (DWT) followed by embedded zerotree encoding is a very efficient technique for image compression [2, 5, 4]. However, the algorithms proposed in l...
Jörg Ritter, Paul Molitor