Sciweavers

2421 search results - page 1 / 485
» Message from the Editor-in-Chief
Sort
View
IPPS
2006
IEEE
15 years 4 months ago
Coordinated checkpoint from message payload in pessimistic sender-based message logging
Execution of MPI applications on Clusters and Grid deployments suffers from node and network failure that motivates the use of fault tolerant MPI implementations. Two category tec...
M. Aminian, Mohammad K. Akbari, Bahman Javadi
83
Voted
CTRSA
2001
Springer
80views Cryptology» more  CTRSA 2001»
15 years 2 months ago
From Fixed-Length Messages to Arbitrary-Length Messages Practical RSA Signature Padding Schemes
Geneviève Arboit, Jean-Marc Robert
124
Voted
CORR
2012
Springer
281views Education» more  CORR 2012»
13 years 6 months ago
Belief Propagation by Message Passing in Junction Trees: Computing Each Message Faster Using GPU Parallelization
Compiling Bayesian networks (BNs) to junction trees and performing belief propagation over them is among the most prominent approaches to computing posteriors in BNs. However, bel...
Lu Zheng, Ole J. Mengshoel, Jike Chong
CORR
2006
Springer
151views Education» more  CORR 2006»
14 years 10 months ago
A general computation rule for lossy summaries/messages with examples from equalization
Abstract-- Elaborating on prior work by Minka, we formulate a general computation rule for lossy messages. An important special case (with many applications in communications) is t...
Junli Hu, Hans-Andrea Loeliger, Justin Dauwels, Fr...
PERCOM
2003
ACM
15 years 10 months ago
Pervasive Messaging
Pervasive messaging is the part of pervasive computing that enables users to communicate with each other. Many of today's electronic messaging systems have their own distinct...
Jan-Mark S. Wams, Maarten van Steen