Sciweavers

1221 search results - page 217 / 245
» A Comparison of Two Programming Models for Pervasive Computi...
Sort
View
WSC
1998
13 years 10 months ago
Implementations of Dispatch Rules in Parallel Manufacturing Simulation
Most features in commercial simulation packages are often omitted in parallel simulation benchmarks, because they neither affect the overall correctness of the simulation protocol...
Chu-Cheow Lim, Yoke-Hean Low, Boon-Ping Gan, Sanja...
DAC
2006
ACM
14 years 9 months ago
Optimal simultaneous mapping and clustering for FPGA delay optimization
Both technology mapping and circuit clustering have a large impact on FPGA designs in terms of circuit performance, area, and power dissipation. Existing FPGA design flows carry o...
Joey Y. Lin, Deming Chen, Jason Cong
APPT
2005
Springer
14 years 2 months ago
Autonomous-Centered Problem Allocation Oriented to Cooperation
By reasonably allocating a cooperative problem which need multiple solvers cope with together, the problem could be performed more effectively and efficiently. A problem could be d...
Xiping Liu, Wan-Chun Dou, Guihai Chen, Shijie Cai,...
ICALP
2005
Springer
14 years 2 months ago
Spatial Logics for Bigraphs
Bigraphs are emerging as a (meta-)model for concurrent calculi, like CCS, ambients, πcalculus, and Petri nets. They are built orthogonally on two structures: a hierarchical place...
Giovanni Conforti, Damiano Macedonio, Vladimiro Sa...
ICALP
2005
Springer
14 years 2 months ago
Basing Cryptographic Protocols on Tamper-Evident Seals
Abstract. In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic ope...
Tal Moran, Moni Naor