Sciweavers

1084 search results - page 52 / 217
» Design and Evaluation of a Selective Compressed Memory Syste...
Sort
View
ACNS
2009
Springer
193views Cryptology» more  ACNS 2009»
15 years 10 months ago
Cryptanalysis of Twister
In this paper, we present a pseudo-collision attack on the compression function of all Twister variants (224,256,384,512) with complexity of about 226.5 compression function evalua...
Florian Mendel, Christian Rechberger, Martin Schl&...
148
Voted
TC
2010
15 years 2 months ago
The Design and Evaluation of a Self-Organizing Superpeer Network
—Superpeer architectures exploit the heterogeneity of nodes in a peer-to-peer (P2P) network by assigning additional responsibilities to higher capacity nodes. In the design of a ...
Pawel Garbacki, Dick H. J. Epema, Maarten van Stee...
EUROSYS
2011
ACM
14 years 7 months ago
SRM-buffer: an OS buffer management technique to prevent last level cache from thrashing in multicores
Buffer caches in operating systems keep active file blocks in memory to reduce disk accesses. Related studies have been focused on how to minimize buffer misses and the caused pe...
Xiaoning Ding, Kaibo Wang, Xiaodong Zhang
165
Voted
RSP
2006
IEEE
120views Control Systems» more  RSP 2006»
15 years 10 months ago
A Case Study of Design Space Exploration for Embedded Multimedia Applications on SoCs
Embedded real-time multimedia applications usually imply data parallel processing. SIMD processors embedded in SOCs are cost-effective to exploit the underlying parallelism. Howev...
Isabelle Hurbain, Corinne Ancourt, François...
128
Voted
TMM
2008
121views more  TMM 2008»
15 years 3 months ago
Performance Analysis of Resource Selection Schemes for a Large Scale Video-on-Demand System
The designers of a large scale video-on-demand system face an optimization problem of deciding how to assign movies to multiple disks (servers) such that the request blocking proba...
Jun Guo, Eric Wing Ming Wong, Sammy Chan, Peter Ta...