Sciweavers

638 search results - page 84 / 128
» Robust Topology Representing Networks
Sort
View
SC
2009
ACM
15 years 6 months ago
Allocator implementations for network-on-chip routers
The present contribution explores the design space for virtual channel (VC) and switch allocators in network-on-chip (NoC) routers. Based on detailed RTL-level implementations, we...
Daniel U. Becker, William J. Dally
IPPS
2005
IEEE
15 years 5 months ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...
TDSC
2010
218views more  TDSC 2010»
14 years 10 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
CLUSTER
2002
IEEE
15 years 4 months ago
An Extensible, Portable, Scalable Cluster Management Software Architecture
This paper describes an object-oriented software architecture for cluster integration and management that enables extensibility, portability, and scalability. This architecture ha...
James H. Laros III, Lee Ward, Nathan W. Dauchy, Ro...
DL
1998
Springer
158views Digital Library» more  DL 1998»
15 years 4 months ago
Making Global Digital Libraries Work: Collection Services, Connectivity Regions, and Collection Views
There are many technical challenges in designing the architecture of globally-distributed, federated digital libraries. This paper focuses on the problem of global resource discov...
Carl Lagoze, David Fielding, Sandra Payette