Sciweavers

1585 search results - page 73 / 317
» Automatically optimizing secure computation
Sort
View
CCS
2006
ACM
13 years 11 months ago
Defeasible security policy composition for web services
The ability to automatically compose security policies created by multiple organizations is fundamental to the development of scalable security systems. The diversity of policies ...
Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A...
EUROPAR
2007
Springer
13 years 11 months ago
Optimizing Chip Multiprocessor Work Distribution Using Dynamic Compilation
How can sequential applications benefit from the ubiquitous next generation of chip multiprocessors (CMP)? Part of the answer may be a dynamic execution environment that automatica...
Jisheng Zhao, Matthew Horsnell, Ian Rogers, Andrew...
DAC
2005
ACM
14 years 9 months ago
Automatic generation of customized discrete fourier transform IPs
This paper presents a parameterized soft core generator for the discrete Fourier transform (DFT). Reusable IPs of digital signal processing (DSP) kernels are important time-saving...
Grace Nordin, Peter A. Milder, James C. Hoe, Marku...
IPPS
2008
IEEE
14 years 2 months ago
Automatic middleware deployment planning on heterogeneous platforms
Abstract— The use of many distributed, heterogeneous resources as a large collective platform offers great potential. A key issue for these grid platforms is middleware scalabili...
Pushpinder-Kaur Chouhan, Eddy Caron, Fréd&e...
APSCC
2009
IEEE
14 years 1 months ago
Extended policies for automatic service composition in IMS
— Service creation by composing existing services and/or network resources is considered by Telecom and Internet industries as the trend for service provisioning in Next Generati...
Cuiting Huang, Noël Crespi