Sciweavers

3056 search results - page 527 / 612
» Open Implementation Analysis and Design
Sort
View
103
Voted
IPPS
2006
IEEE
15 years 9 months ago
Parallel calculation of volcanoes for cryptographic uses
Elliptic curve cryptosystems are nowadays widely used in the design of many security devices. Nevertheless, since not every elliptic curve is useful for cryptographic purposes, me...
Santi Martínez, R. Tomas, C. Roig, Magda Va...
111
Voted
ISCA
2006
IEEE
121views Hardware» more  ISCA 2006»
15 years 9 months ago
Flexible Snooping: Adaptive Forwarding and Filtering of Snoops in Embedded-Ring Multiprocessors
A simple and low-cost approach to supporting snoopy cache coherence is to logically embed a unidirectional ring in the network of a multiprocessor, and use it to transfer snoop me...
Karin Strauss, Xiaowei Shen, Josep Torrellas
134
Voted
WOWMOM
2006
ACM
137views Multimedia» more  WOWMOM 2006»
15 years 9 months ago
Evaluating Context Information Predictability for Autonomic Communication
Delay tolerant and mobile ad hoc networks, present considerable challenges to the development of protocols and systems. In particular, the challenge of being able to cope with the...
Mirco Musolesi, Cecilia Mascolo
124
Voted
ICNP
2005
IEEE
15 years 9 months ago
Exploiting Dynamic Querying like Flooding Techniques in Unstructured Peer-to-Peer Networks
In unstructured peer-to-peer networks, controlled flooding aims at locating an item at the minimum message cost. Dynamic querying is a new controlled flooding technique. While i...
Hongbo Jiang, Shudong Jin
ANCS
2005
ACM
15 years 9 months ago
High-throughput linked-pattern matching for intrusion detection systems
This paper presents a hardware architecture for highly efficient intrusion detection systems. In addition, a software tool for automatically generating the hardware is presented....
Zachary K. Baker, Viktor K. Prasanna