Sciweavers

6907 search results - page 255 / 1382
» Securing distributed adaptation
Sort
View
MICRO
2000
IEEE
96views Hardware» more  MICRO 2000»
15 years 8 months ago
Instruction distribution heuristics for quad-cluster, dynamically-scheduled, superscalar processors
We investigate instruction distribution methods for quadcluster, dynamically-scheduled superscalar processors. We study a variety of methods with different cost, performance and c...
Amirali Baniasadi, Andreas Moshovos
PERCOM
2005
ACM
16 years 4 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
15 years 10 months ago
Universally Composable Security with Global Setup
Abstract. Cryptographic protocols are often designed and analyzed under some trusted set-up assumptions, namely in settings where the participants have access to global information...
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi W...
HPDC
1999
IEEE
15 years 8 months ago
PARED: A Framework for the Adaptive Solution of PDEs
We describe our experience using PARED, an object oriented system for the adaptive solution of PDEs in a distributed computing environment. PARED handles selective mesh refinement...
José G. Castaños, John E. Savage
DEBS
2007
ACM
15 years 8 months ago
Adapting publish-subscribe routing to traffic demands
Most of currently available content-based publish-subscribe systems that were designed to operate in large scale, wired scenarios, build their routing infrastructure as a set of b...
Matteo Migliavacca, Gianpaolo Cugola