Sciweavers

5790 search results - page 1028 / 1158
» Distributed programming with distributed authorization
Sort
View
IEEEPACT
2005
IEEE
15 years 10 months ago
Exploiting Coarse-Grained Parallelism to Accelerate Protein Motif Finding with a Network Processor
While general-purpose processors have only recently employed chip multiprocessor (CMP) architectures, network processors (NPs) have used heterogeneous multi-core architectures sin...
Ben Wun, Jeremy Buhler, Patrick Crowley
144
Voted
MICRO
2005
IEEE
123views Hardware» more  MICRO 2005»
15 years 10 months ago
A Criticality Analysis of Clustering in Superscalar Processors
Clustered machines partition hardware resources to circumvent the cycle time penalties incurred by large, monolithic structures. This partitioning introduces a long inter-cluster ...
Pierre Salverda, Craig B. Zilles
126
Voted
SKG
2005
IEEE
15 years 10 months ago
Converting the Industry Foundation Classes to the Web Ontology Language
The upcoming next generation of the internet, often referred to as the Semantic Web, will bring a lot of new technologies, one of which is the Web Ontology Language (OWL). One fea...
Hans Schevers, Robin Drogemuller
TRIDENTCOM
2005
IEEE
15 years 10 months ago
A Geography-Aware Scalable Community Wireless Network Test Bed
Wireless mesh networks have increasingly become an object of interest in recent years as a strong alternative to purely wired infrastructure networks and purely mobile wireless ne...
Bow-Nan Cheng, Shivkumar Kalyanaraman, Max Klein
WORDS
2005
IEEE
15 years 10 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
« Prev « First page 1028 / 1158 Last » Next »