Sciweavers

4820 search results - page 109 / 964
» Implementing Signatures for C
Sort
View
JACM
2010
104views more  JACM 2010»
14 years 10 months ago
Tight failure detection bounds on atomic object implementations
This article determines the weakest failure detectors to implement shared atomic objects in a distributed system with crash-prone processes. We first determine the weakest failure...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...
CBMS
2009
IEEE
15 years 1 months ago
Implementation and analysis of scalable display architecture for laparoscopy
We report on a display system to support laparoscopy by loosely coupling input sensors (e.g., cameras) with outputs (e.g., image displays). A low-latency and general-purpose compu...
C. Andy Martin, Qiong Han, Duncan Clarke, C. Melod...
ICMCS
2005
IEEE
115views Multimedia» more  ICMCS 2005»
15 years 5 months ago
Implementation of H.264 decoder on Sandblaster DSP
This paper presents the optimization techniques and results of implementing the H.264/AVC baseline profile decoder in software on the Sandblaster digital signal processor. It has ...
Vaidyanathan Ramadurai, Sanjay Jinturkar, Mayan Mo...
IPPS
2000
IEEE
15 years 4 months ago
Implementation of Finite Lattices in VLSI for Fault-State Encoding in High-Speed Networks
In this paper the propagation of information about fault states and its implementation in high-speed networks is discussed. The algebraic concept of a lattice partial ordered set ...
Andreas C. Döring, Gunther Lustig
ESORICS
2011
Springer
13 years 11 months ago
Remote Timing Attacks Are Still Practical
For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not ru...
Billy Bob Brumley, Nicola Tuveri