Sciweavers

1102 search results - page 163 / 221
» Distributed Key Generation for the Internet
Sort
View
IEEEPACT
2002
IEEE
15 years 7 months ago
Exploiting Pseudo-Schedules to Guide Data Dependence Graph Partitioning
This paper presents a new modulo scheduling algorithm for clustered microarchitectures. The main feature of the proposed scheme is that the assignment of instructions to clusters ...
Alex Aletà, Josep M. Codina, F. Jesú...
CIKM
2001
Springer
15 years 7 months ago
The Enosys Markets Data Integration Platform: Lessons from the Trenches
Enosys Markets offers a state-of-the-art data integration software platform to support the development of the next generation of eBusiness applications that deliver value by provi...
Yannis Papakonstantinou, Vasilis Vassalos
COMPSAC
1998
IEEE
15 years 7 months ago
M-base: Enduser-Initiative Application Development Based on Message Flow and Componentware
Explosive increase in enduser computing on distributed systems requires that endusers develop application software by themselves. One solution is given as a formula of "a dom...
Takeshi Chusho, Mitsuyoshi Matsumoto, Yuji Konishi
ICS
2000
Tsinghua U.
15 years 6 months ago
Synthesizing transformations for locality enhancement of imperfectly-nested loop nests
We present an approach for synthesizing transformations to enhance locality in imperfectly-nested loops. The key idea is to embed the iteration space of every statement in a loop ...
Nawaaz Ahmed, Nikolay Mateev, Keshav Pingali
127
Voted
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
15 years 6 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert