Sciweavers

3999 search results - page 749 / 800
» Design of Optical Access Systems using Computer Modeling
Sort
View
NDSS
2003
IEEE
14 years 29 days ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two partiesā€”the client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
EDBT
2009
ACM
166views Database» more  EDBT 2009»
14 years 2 months ago
Shore-MT: a scalable storage manager for the multicore era
Database storage managers have long been able to efficiently handle multiple concurrent requests. Until recently, however, a computer contained only a few single-core CPUs, and th...
Ryan Johnson, Ippokratis Pandis, Nikos Hardavellas...
RTSS
2009
IEEE
14 years 2 months ago
Coordinated Task Scheduling, Allocation and Synchronization on Multiprocessors
ā€”Chip-multiprocessors represent a dominant new shift in the ļ¬eld of processor design. Better utilization of such technology in the real-time context requires coordinated approa...
Karthik Lakshmanan, Dionisio de Niz, Ragunathan Ra...
BROADNETS
2006
IEEE
14 years 1 months ago
An Energy Efficient and Accurate Slot Synchronization Scheme for Wireless Sensor Networks
Existing slotted channel access schemes in wireless networks assume that slot boundaries at all nodes are synchronized. In practice, relative clock drifts among nodes cause slot mi...
Lillian Dai, Prithwish Basu, Jason Redi
BCS
2008
13 years 9 months ago
A Customisable Multiprocessor for Application-Optimised Inductive Logic Programming
This paper describes a customisable processor designed to accelerate execution of inductive logic programming, targeting advanced field-programmable gate array (FPGA) technology. ...
Andreas Fidjeland, Wayne Luk, Stephen Muggleton