Sciweavers

1528 search results - page 82 / 306
» Implementing Generalized Operator Overloading
Sort
View
CHES
2003
Springer
88views Cryptology» more  CHES 2003»
15 years 10 months ago
A New Algorithm for Switching from Arithmetic to Boolean Masking
To protect a cryptographic algorithm against Differential Power Analysis, a general method consists in masking all intermediate data with a random value. When a cryptographic algo...
Jean-Sébastien Coron, Alexei Tchulkine
ICCS
2001
Springer
15 years 9 months ago
Towards an Accurate Model for Collective Communications
The performance of the MPI’s collective communications is critical in most MPI-based applications. A general algorithm for a given collective communication operation may not give...
Sathish S. Vadhiyar, Graham E. Fagg, Jack Dongarra
PODC
2010
ACM
15 years 8 months ago
Brief announcement: tree decomposition for faster concurrent data structures
We show how to partition data structures representable by directed acyclic graphs, i.e. rooted trees, to allow for efficient complex operations, which lie beyond inserts, deletes ...
Johannes Schneider, Roger Wattenhofer
PODC
2010
ACM
15 years 8 months ago
Brief announcement: a shared disk on distributed storage
A shared disk implementation on distributed storage requires consistent behavior of disk operations. Deterministic consensus on such behavior is impossible when even a single stor...
Stefan Vijzelaar, Herbert Bos, Wan Fokkink
WSC
2007
15 years 7 months ago
A toolbox for simulation-based optimization of supply chains
In this paper we present a general framework for simulating and optimizing the operational decisions in a supply chain network. We developed a supply chain network library for the...
Christian Almeder, Margaretha Preusser