Sciweavers

9631 search results - page 1883 / 1927
» The Costs of Using JXTA
Sort
View
ACNS
2004
Springer
85views Cryptology» more  ACNS 2004»
15 years 3 months ago
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to hig...
Michael E. Locasto, Angelos D. Keromytis
CCGRID
2004
IEEE
15 years 3 months ago
DWDM-RAM: a data intensive Grid service architecture enabled by dynamic optical networks
Next generation applications and architectures (for example, Grids) are driving radical changes in the nature of traffic, service models, technology, and cost, creating opportunit...
Tal Lavian, Joe Mambretti, Doug Cutrell, Howard J....
CGO
2004
IEEE
15 years 3 months ago
A Compiler Scheme for Reusing Intermediate Computation Results
Recent research has shown that programs often exhibit value locality. Such locality occurs when a code segment, although executed repeatedly in the program, takes only a small num...
Yonghua Ding, Zhiyuan Li
CIA
2004
Springer
15 years 3 months ago
Auction Equilibrium Strategies for Task Allocation in Uncertain Environments
Abstract. In this paper we address a model of self interested information agents competing to perform tasks. The agents are situated in an uncertain environment while different tas...
David Sarne, Meirav Hadad, Sarit Kraus
ASPLOS
2006
ACM
15 years 3 months ago
Accurate and efficient regression modeling for microarchitectural performance and power prediction
We propose regression modeling as an efficient approach for accurately predicting performance and power for various applications executing on any microprocessor configuration in a...
Benjamin C. Lee, David M. Brooks
« Prev « First page 1883 / 1927 Last » Next »