Sciweavers

156 search results - page 17 / 32
» A comparison of software and hardware techniques for x86 vir...
Sort
View
IOLTS
2007
IEEE
110views Hardware» more  IOLTS 2007»
14 years 1 months ago
An Elliptic Curve Cryptosystem Design Based on FPGA Pipeline Folding
In this paper we present an efficient design technique for implementing the Elliptic Curve Cryptographic (ECC) Scheme in FPGAs. Our technique is based on a novel and efficient i...
Osama Al-Khaleel, Christos A. Papachristou, Franci...
CLUSTER
2004
IEEE
13 years 7 months ago
Seamless Access to Decentralized Storage Services in Computational Grids via a Virtual File System
This paper describes a novel technique for establishing a virtual file system that allows data to be transferred user-transparently and on-demand across computing and storage serve...
Renato J. O. Figueiredo, Nirav H. Kapadia, Jos&eac...
CN
1999
156views more  CN 1999»
13 years 7 months ago
Virtual reality movies-real-time streaming of 3D objects
Powerful servers for computation and storage, high-speed networking resources, and high-performance 3D graphics workstation, which are typically available in scientific research e...
Stephan Olbrich, Helmut Pralle
DAGSTUHL
2001
13 years 9 months ago
Programmable Networks
In this paper we present a programmable networking model that provides a common framework for understanding the state-of-the-art in programmable networks. A number of projects are...
Andrew T. Campbell, Michael E. Kounavis, John B. V...
SOSP
1993
ACM
13 years 8 months ago
Protection Traps and Alternatives for Memory Management of an Object-Oriented Language
Many operating systems allow user programs to specify the protectionlevel (inaccessible, read-only, read-write) of pages in their virtual memory address space, and to handle any p...
Antony L. Hosking, J. Eliot B. Moss