Sciweavers

21876 search results - page 4177 / 4376
» Computer game-flow design
Sort
View
ACNS
2009
Springer
193views Cryptology» more  ACNS 2009»
15 years 10 months ago
Cryptanalysis of Twister
In this paper, we present a pseudo-collision attack on the compression function of all Twister variants (224,256,384,512) with complexity of about 226.5 compression function evalua...
Florian Mendel, Christian Rechberger, Martin Schl&...
NOCS
2007
IEEE
15 years 10 months ago
The Power of Priority: NoC Based Distributed Cache Coherency
The paper introduces Network-on-Chip (NoC) design methodology and low cost mechanisms for supporting efficient cache access and cache coherency in future high-performance Chip Mul...
Evgeny Bolotin, Zvika Guz, Israel Cidon, Ran Ginos...
IWOMP
2007
Springer
15 years 10 months ago
Supporting OpenMP on Cell
The Cell processor is a heterogeneous multi-core processor with one Power Processing Engine (PPE) core and eight Synergistic Processing Engine (SPE) cores. Each SPE has a directly...
Kevin O'Brien, Kathryn M. O'Brien, Zehra Sura, Ton...
EUROSYS
2010
ACM
15 years 10 months ago
PUSH: A Dataflow Shell
The deluge of huge data sets such as those provided by sensor networks, online transactions, and the web provide exciting opportunities for data analysis. The scale of the data ...
Noah Evans, Eric Van Hensbergen
GI
2005
Springer
15 years 9 months ago
Modellierung von Netzsicherheitsystemen umfangreicher vernetzter IT-Infrastrukturen
: Angesichts zunehmend komplexer werdender vernetzter IT-Infrastrukturen sind das integrierte Design und das automatisierte Management der unterschiedlichen Sicherheitstechniken un...
João Porto de Albuquerque, Heiko Krumm, Pau...
« Prev « First page 4177 / 4376 Last » Next »