Sciweavers

1555 search results - page 108 / 311
» A data intensive distributed computing architecture for
Sort
View
161
Voted
WIMOB
2007
IEEE
15 years 9 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
127
Voted
ICS
1998
Tsinghua U.
15 years 7 months ago
High-level Management of Communication Schedules in HPF-like Languages
The goal of High Performance Fortran (HPF) is to "address the problems of writing data parallel programs where the distribution of data affects performance", providing t...
Siegfried Benkner, Piyush Mehrotra, John Van Rosen...
130
Voted
HPCA
2005
IEEE
15 years 9 months ago
Enterprise IT Trends and Implications for Architecture Research
The last decade has seen several changes in the structure and emphasis of enterprise IT systems. Specific infrastructure trends have included the emergence of large consolidated d...
Parthasarathy Ranganathan, Norman P. Jouppi
141
Voted
CLUSTER
2009
IEEE
15 years 10 months ago
Integrating software distributed shared memory and message passing programming
Abstract—Software Distributed Shared Memory (SDSM) systems provide programmers with a shared memory programming environment across distributed memory architectures. In contrast t...
H'sien J. Wong, Alistair P. Rendell
148
Voted
DAC
2009
ACM
15 years 1 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic