Sciweavers

1192 search results - page 174 / 239
» Computing Weakest Readings
Sort
View
ASAP
2005
IEEE
96views Hardware» more  ASAP 2005»
15 years 9 months ago
On-Chip Lookup Tables for Fast Symmetric-Key Encryption
On public communication networks such as the Internet, data confidentiality can be provided by symmetric-key ciphers. One of the most common operations used in symmetric-key ciphe...
A. Murat Fiskiran, Ruby B. Lee
IEEEPACT
2005
IEEE
15 years 9 months ago
Compiler Directed Early Register Release
This paper presents a novel compiler directed technique to reduce the register pressure and power of the register file by releasing registers early. The compiler identifies regi...
Timothy M. Jones, Michael F. P. O'Boyle, Jaume Abe...
IEEEPACT
2005
IEEE
15 years 9 months ago
Communication Optimizations for Fine-Grained UPC Applications
Global address space languages like UPC exhibit high performance and portability on a broad class of shared and distributed memory parallel architectures. The most scalable applic...
Wei-Yu Chen, Costin Iancu, Katherine A. Yelick
ISCC
2005
IEEE
15 years 9 months ago
Describing Multidimensional Schedules for Media-Access Control in Time-Triggered Communication
A shared communication medium is characterized by multiple entities that use this medium by reading and writing from and to it. Write operations on the shared communication medium...
Sebastian Fischmeister
SSDBM
2005
IEEE
140views Database» more  SSDBM 2005»
15 years 9 months ago
Optimizing In-Order Execution of Continuous Queries over Streamed Sensor Data
The widespread use of sensor networks in scientific and engineering applications leads to increased demand on the efficient computation of the collected sensor data. Recent rese...
Moustafa A. Hammad, Walid G. Aref, Ahmed K. Elmaga...