Sciweavers

1513 search results - page 254 / 303
» Fibonacci Correction Networks
Sort
View
114
Voted
APSEC
2007
IEEE
15 years 10 months ago
Coordination-Policy Based Composed System Behavior Derivation
The coordination-policy that components interactions satisfied often determines the properties of nowadays component-based information systems, e.g. Safety, Liveness and Fairness ...
Yiming Lau, Wenyun Zhao, Xin Peng, Zhixiong Jiang,...
129
Voted
ARITH
2007
IEEE
15 years 10 months ago
Optimistic Parallelization of Floating-Point Accumulation
Abstract— Floating-point arithmetic is notoriously nonassociative due to the limited precision representation which demands intermediate values be rounded to fit in the availabl...
Nachiket Kapre, André DeHon
123
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Power-Modulated Challenge-Response Schemes for Verifying Location Claims
—Location information should be verifiable in order to support new computing and information services. In this paper, we adapt the classical challenge-response method for authen...
Yu Zhang, Zang Li, Wade Trappe
139
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
A Hash Function Scheme for Key Management in UMTS MBMS
—3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service ...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin
128
Voted
HPCA
2007
IEEE
15 years 10 months ago
Error Detection via Online Checking of Cache Coherence with Token Coherence Signatures
To provide high dependability in a multithreaded system despite hardware faults, the system must detect and correct errors in its shared memory system. Recent research has explore...
Albert Meixner, Daniel J. Sorin