Sciweavers

5333 search results - page 293 / 1067
» Optimizing Computer System Configurations
Sort
View
DATE
2010
IEEE
173views Hardware» more  DATE 2010»
15 years 9 months ago
Robust design of embedded systems
—This paper presents a methodology to evaluate and optimize the robustness of an embedded system in terms of invariability in case of design revisions. Early decisions in embedde...
Martin Lukasiewycz, Michael Glaß, Jürge...
TSP
2010
14 years 10 months ago
A recursive method for the approximation of LTI systems using subband processing
Using the subband technique, an LTI system can be implemented by the composition of an analysis filterbank, followed by a transfer matrix (subband model) and a synthesis filterbank...
Damián Marelli, Minyue Fu
187
Voted
CRYPTO
2003
Springer
187views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
We consider the problem of constructing randomness extractors that are locally computable; that is, read only a small number of bits from their input. As recently shown by Lu (thi...
Salil P. Vadhan
HPCN
1995
Springer
15 years 7 months ago
Exploiting high performance Fortran for computational fluid dynamics
Abstract. We discuss the High Performance Fortran data parallel programming language as an aid to software engineering and as a tool for exploiting High Performance Computing syste...
Kenneth A. Hawick, Geoffrey Fox
ICPPW
2009
IEEE
15 years 10 months ago
Autonomic SLA Management in Federated Computing Environments
—Federated computing environments offer requestors the ability to dynamically invoke services offered by collaborating providers in the virtual service network. Without an effici...
Pawel Rubach, Michael W. Sobolewski