Sciweavers

1926 search results - page 151 / 386
» From P to MP Systems
Sort
View
IPPS
1998
IEEE
15 years 2 months ago
The Implicit Pipeline Method
We present a novel scheme for the solution of linear differential equation systems on parallel computers. The Implicit Pipeline (ImP) method uses an implicit timeintegration schem...
John B. Pormann
ECAI
2006
Springer
15 years 1 months ago
Distributed Log-Based Reconciliation
Computer Supported Cooperative Work (CSCW) defines software tools and technology to support groups of people working together on a project, often at different sites [5]. In this wo...
Yek Loong Chong, Youssef Hamadi
EUROCRYPT
2000
Springer
15 years 1 months ago
A NICE Cryptanalysis
We present a chosen-ciphertext attack against both NICE cryptosystems. These two cryptosystems are based on computations in the class group of non-maximal imaginary orders. More pr...
Éliane Jaulmes, Antoine Joux
IC
2003
14 years 11 months ago
Extensions of Magic Square Using Recovery Nodes Against Node Failures
Magic Square is a ppeer-to-peer protocol for searching resources. The recovery cost of Magic Square is high and the system doesn’t recover the failure in simultaneous neighbor n...
Hyun-ju Lee, Il-dong Jung, Young-song Son, Kyongso...
FAC
2006
92views more  FAC 2006»
14 years 10 months ago
Action Refinement Applied to Late Decisions
In modular approaches to specify concurrent systems a system is built up from components using various operators as e.g. the sequential, the parallel, or the choice (+) operator. U...
Harald Fecher, Mila E. Majster-Cederbaum