Sciweavers

5898 search results - page 1153 / 1180
» Parallel Computing Environments and Methods
Sort
View
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 8 months ago
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and ...
Mark Manulis
IEEEPACT
2008
IEEE
15 years 8 months ago
Feature selection and policy optimization for distributed instruction placement using reinforcement learning
Communication overheads are one of the fundamental challenges in a multiprocessor system. As the number of processors on a chip increases, communication overheads and the distribu...
Katherine E. Coons, Behnam Robatmili, Matthew E. T...
ICDCSW
2005
IEEE
15 years 7 months ago
Zmail: Zero-Sum Free Market Control of Spam
The problem of spam is a classic “tragedy of the commons” [10]. We propose the Zmail protocol as a way to preserve email as a “free” common resource for most users, while ...
Benjamin Kuipers, Alex X. Liu, Aashin Gautam, Moha...
APGV
2004
ACM
164views Visualization» more  APGV 2004»
15 years 7 months ago
Subband encoding of high dynamic range imagery
The transition from traditional 24-bit RGB to high dynamic range (HDR) images is hindered by excessively large file formats with no backwards compatibility. In this paper, we prop...
Greg Ward, Maryann Simmons
DATE
2010
IEEE
113views Hardware» more  DATE 2010»
15 years 7 months ago
PM-COSYN: PE and memory co-synthesis for MPSoCs
—Multi-Processor System-on-Chips (MPSoCs) exploit task-level parallelism to achieve high computation throughput, but concurrent memory accesses from multiple PEs may cause memory...
Yi-Jung Chen, Chia-Lin Yang, Po-Han Wang
« Prev « First page 1153 / 1180 Last » Next »