Sciweavers

1528 search results - page 103 / 306
» Implementing Generalized Operator Overloading
Sort
View
SIGSOFT
2009
ACM
15 years 7 months ago
Qos-driven runtime adaptation of service oriented architectures
Runtime adaptation is recognized as a viable way for a serviceoriented system to meet QoS requirements in its volatile operating environment. In this paper we propose a methodolog...
Valeria Cardellini, Emiliano Casalicchio, Vincenzo...
110
Voted
EENERGY
2010
15 years 6 months ago
Event-driven processor power management
Energy-efficient computing as a research area has been receiving increasing attention in recent years due to rising energy costs and environmental awareness. In this paper, we pre...
Jan Hendrik Schönherr, Jan Richling, Matthias...
ASAP
2004
IEEE
141views Hardware» more  ASAP 2004»
15 years 6 months ago
Evaluating Instruction Set Extensions for Fast Arithmetic on Binary Finite Fields
Binary finite fields GF(2n ) are very commonly used in cryptography, particularly in publickey algorithms such as Elliptic Curve Cryptography (ECC). On word-oriented programmable ...
A. Murat Fiskiran, Ruby B. Lee
ATAL
2006
Springer
15 years 6 months ago
Performance evaluation of open-source multiagent platforms
Nowadays, most multiagent platforms are internally designed as middleware and are usually implemented in Java and run on top of an operating system. This kind of design maximizes ...
Luis Mulet, Jose M. Such, Juan M. Alberola
114
Voted
PEWASUN
2008
ACM
15 years 4 months ago
Modular network trace analysis
In this paper we present EDAT, a tool designed for the analysis of trace files from network simulations and experiments. The EDAT framework encapsulates analysis steps in extensib...
Wolfgang Kieß, Nadine Chmill, Ulrich Wittels...