Sciweavers

519 search results - page 56 / 104
» Requirements, Implementation and Applications of Hand-held V...
Sort
View
PKC
1999
Springer
94views Cryptology» more  PKC 1999»
15 years 4 months ago
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor
Public-key implementers often face strong hardware-related constraints. In particular, modular operations required in most cryptosystems generally constitute a computational bottle...
Pascal Paillier
PCRCW
1997
Springer
15 years 4 months ago
ChaosLAN: Design and Implementation of a Gigabit LAN Using Chaotic Routing
In recent years, theChaos Project at theUniversityofWashingtonhas analyzed and simulated a dozen routing algorithms. Three new routing algorithms have been invented; of these, the...
Neil R. McKenzie, Kevin Bolding, Carl Ebeling, Law...
ICS
1999
Tsinghua U.
15 years 4 months ago
Fast cluster failover using virtual memory-mapped communication
This paper proposes a novel way to use virtual memorymapped communication (VMMC) to reduce the failover time on clusters. With the VMMC model, applications’ virtual address spac...
Yuanyuan Zhou, Peter M. Chen, Kai Li
WOSP
2010
ACM
15 years 6 months ago
Agile resource management in a virtualized data center
In this paper we develop, implement and evaluate an approach to quickly reassign resources for a virtualized utility computing platform. The approach provides this platform agilit...
Wei Zhang, Hangwei Qian, Craig E. Wills, Michael R...
AFRIGRAPH
2004
ACM
15 years 5 months ago
Realistic shading of human skin in real time
The demand for realistic human characters is driven by interactive application developers worldwide. The look of 3D models in real time graphics is efficiently improved by powerfu...
Florian Struck, Christian-A. Bohn, Sebastian Schmi...