Sciweavers

955 search results - page 162 / 191
» A study of application performance with non-volatile main me...
Sort
View
IWSOS
2009
Springer
14 years 1 months ago
Revisiting P2P Content Sharing in Wireless Ad Hoc Networks
Classical content sharing applications like BitTorrent are not designed to run over wireless networks. When adapting them to these constrained networks, two main problems arise. On...
Mohamed Karim Sbai, Chadi Barakat
VTC
2006
IEEE
117views Communications» more  VTC 2006»
14 years 1 months ago
Monitoring the Position Integrity in Road Transport Localization Based Services
— Nowadays, a new generation of civil location based services (LBS) included in the intelligent road transport systems (ITS-R) field is emerging. The reliability of positioning ...
José Santa, Benito Úbeda Miña...
CTRSA
2005
Springer
138views Cryptology» more  CTRSA 2005»
14 years 29 days ago
CryptoGraphics: Secret Key Cryptography Using Graphics Cards
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by exploiting the ability for GPUs to simultaneously process large quantities of pi...
Debra L. Cook, John Ioannidis, Angelos D. Keromyti...
CF
2005
ACM
13 years 9 months ago
Reducing misspeculation overhead for module-level speculative execution
Thread-level speculative execution is a technique that makes it possible for a wider range of single-threaded applications to make use of the processing resources in a chip multip...
Fredrik Warg, Per Stenström
EPEW
2008
Springer
13 years 9 months ago
Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust
The problem of finding trust paths and estimating the trust one can place in a partner arises in various application areas, including virtual organisations, authentication systems ...
Huqiu Zhang, Aad P. A. van Moorsel