Sciweavers

5344 search results - page 267 / 1069
» Privacy-Preserving Set Operations
Sort
View
143
Voted
LPNMR
2004
Springer
15 years 9 months ago
Logic Programs With Monotone Cardinality Atoms
We investigate mca-programs, that is, logic programs with clauses built of monotone cardinality atoms of the form kX , where k is a non-negative integer and X is a finite set of ...
V. Wiktor Marek, Ilkka Niemelä, Miroslaw Trus...
PVM
2004
Springer
15 years 9 months ago
The Impact of File Systems on MPI-IO Scalability
As the number of nodes in cluster systems continues to grow, leveraging scalable algorithms in all aspects of such systems becomes key to maintaining performance. While scalable al...
Robert Latham, Robert B. Ross, Rajeev Thakur
FCCM
2003
IEEE
185views VLSI» more  FCCM 2003»
15 years 9 months ago
Implementation of a Content-Scanning Module for an Internet Firewall
A module has been implemented in Field Programmable Gate Array (FPGA) hardware that scans the content of Internet packets at Gigabit/second rates. All of the packet processing ope...
James Moscola, John W. Lockwood, Ronald Prescott L...
HOTOS
2003
IEEE
15 years 9 months ago
FAB: Enterprise Storage Systems on a Shoestring
Abstract—A Federated Array of Bricks (FAB) is a logical disk system that provides the reliability and performance of enterprise-class disk arrays, at a fraction of the cost and w...
Svend Frølund, Arif Merchant, Yasushi Saito...
ITC
2003
IEEE
170views Hardware» more  ITC 2003»
15 years 9 months ago
Double-Tree Scan: A Novel Low-Power Scan-Path Architecture
In a scan-based system with a large number of flip-flops, a major component of power is consumed during scanshift and clocking operation in test mode. In this paper, a novel scan-...
Bhargab B. Bhattacharya, Sharad C. Seth, Sheng Zha...