Sciweavers

3836 search results - page 524 / 768
» Optimizing the Use of High Performance Software Libraries
Sort
View
COMPSAC
2008
IEEE
15 years 11 months ago
Error Modeling in Dependable Component-Based Systems
Component-Based Development (CBD) of software, with its successes in enterprise computing, has the promise of being a good development model due to its cost effectiveness and pote...
Hüseyin Aysan, Sasikumar Punnekkat, Radu Dobr...
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
15 years 9 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
TJS
2002
118views more  TJS 2002»
15 years 4 months ago
The MAGNeT Toolkit: Design, Implementation and Evaluation
Abstract-The current trend in constructing high-performance computing systems is to connect a large number of machines via a fast interconnect or a large-scale network such as the ...
Wu-chun Feng, Mark K. Gardner, Jeffrey R. Hay
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
15 years 11 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiï...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
IPPS
2006
IEEE
15 years 11 months ago
On-chip and on-line self-reconfigurable adaptable platform: the non-uniform cellular automata case
In spite of the high parallelism exhibited by cellular automata architectures, most implementations are usually run in software. For increasing execution parallelism, hardware imp...
Andres Upegui, Eduardo Sanchez