Sciweavers

23589 search results - page 4511 / 4718
» Uncheatable Distributed Computations
Sort
View
GCC
2003
Springer
15 years 7 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
ICCS
2003
Springer
15 years 7 months ago
Method Call Acceleration in Embedded Java Virtual Machines
Object oriented languages, in particular Java, use a frequent dynamic dispatch mechanism to search for the definition of an invoked method. A method could be defined in more than...
Mourad Debbabi, M. M. Erhioui, Lamia Ketari, Nadia...
ICCSA
2003
Springer
15 years 7 months ago
Knowledge Grid Support for Treatment of Traumatic Brain Injury Victims
Traumatic brain injuries (TBIs) typically result from accidents in which the head strikes an object. Among all traumatic causes of death, the TBI is the most serious one. Moreover,...
Peter Brezany, A. Min Tjoa, Martin Rusnak, Jarmila...
ICS
2003
Tsinghua U.
15 years 7 months ago
Reducing register ports using delayed write-back queues and operand pre-fetch
In high-performance wide-issue microprocessors the access time, energy and area of the register file are often critical to overall performance. This is because these pararmeters g...
Nam Sung Kim, Trevor N. Mudge
123
Voted
ICS
2003
Tsinghua U.
15 years 7 months ago
Inferential queueing and speculative push for reducing critical communication latencies
Communication latencies within critical sections constitute a major bottleneck in some classes of emerging parallel workloads. In this paper, we argue for the use of Inferentially...
Ravi Rajwar, Alain Kägi, James R. Goodman
« Prev « First page 4511 / 4718 Last » Next »