Sciweavers

8953 search results - page 1413 / 1791
» Parallel Query Processing
Sort
View
CHES
2004
Springer
182views Cryptology» more  CHES 2004»
15 years 10 months ago
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems
In the current work we propose a pipelining scheme for implementing Elliptic Curve Cryptosystems (ECC). The scalar multiplication is the dominant operation in ECC. It is computed b...
Pradeep Kumar Mishra
FPL
2004
Springer
117views Hardware» more  FPL 2004»
15 years 10 months ago
Flow Monitoring in High-Speed Networks with 2D Hash Tables
Abstract. Flow monitoring is a required task for a variety of networking applications including fair scheduling and intrusion/anomaly detection. Existing flow monitoring techniques...
David Nguyen, Joseph Zambreno, Gokhan Memik
GCC
2004
Springer
15 years 10 months ago
Agent-Based Resource Selection for Grid Computing
Agent technology is critical in providing solutions to grid computing, including resource selection. Traditionally, agent deliberation offers a deductive process whose deliberation...
Song Shen, Gregory M. P. O'Hare
GCC
2004
Springer
15 years 10 months ago
Maintaining Comprehensive Resource Availability in P2P Networks
Abstract. In this paper, the resource availability issue has been addressed with respect to the intermittent connectivity and dynamic presence of peers in a P2P system. We aim to m...
Bin Xiao, Jiannong Cao, Edwin Hsing-Mean Sha
GRID
2004
Springer
15 years 10 months ago
High-Level Grid Application Environment to Use Legacy Codes as OGSA Grid Services
One of the biggest obstacles in the wide-spread industrial take-up of Grid technology is the existence of a large amount of legacy code that is not accessible as Grid services. Th...
Péter Kacsuk, Ariel Goyeneche, Thierry Dela...
« Prev « First page 1413 / 1791 Last » Next »