Sciweavers

247 search results - page 37 / 50
» Infrastructure Risk Reduction
Sort
View
ISCA
2007
IEEE
114views Hardware» more  ISCA 2007»
15 years 3 months ago
Mechanisms for bounding vulnerabilities of processor structures
Concern for the increasing susceptibility of processor structures to transient errors has led to several recent research efforts that propose architectural techniques to enhance r...
Niranjan Soundararajan, Angshuman Parashar, Anand ...
GECON
2007
Springer
126views Business» more  GECON 2007»
15 years 3 months ago
GridEcon - The Economic-Enhanced Next-Generation Internet
The major shortcoming of Grid middleware systems is the lack of economic-enhanced Grid services. These new services are necessary in order to let Grid users benefit from the proper...
Jörn Altmann, Costas Courcoubetis, John Darli...
71
Voted
INFOCOM
2006
IEEE
15 years 3 months ago
Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security
Abstract— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing ke...
Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xi...
IPPS
2006
IEEE
15 years 3 months ago
Collective operations in NEC's high-performance MPI libraries
We give an overview of the algorithms and implementations in the high-performance MPI libraries MPI/SX and MPI/ES of some of the most important collective operations of MPI (the M...
Hubert Ritzdorf, Jesper Larsson Träff
IPPS
2006
IEEE
15 years 3 months ago
Realization of virtual networks in the DECOS integrated architecture
Due to the better utilization of computational and communication resources and the improved coordination of application subsystems, designers of large distributed embedded systems...
Roman Obermaisser, Philipp Peti