Sciweavers

3972 search results - page 136 / 795
» Design of the iSCSI Protocol
Sort
View
IWSEC
2007
Springer
14 years 4 months ago
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for cl...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
PPOPP
1997
ACM
14 years 2 months ago
The Interaction of Parallel Programming Constructs and Coherence Protocols
Some of the most common parallel programming idioms include locks, barriers, and reduction operations. The interaction of these programming idioms with the multiprocessor's c...
Ricardo Bianchini, Enrique V. Carrera, Leonidas I....
BMCBI
2008
105views more  BMCBI 2008»
13 years 10 months ago
Novel computational methods for increasing PCR primer design effectiveness in directed sequencing
Background: Polymerase chain reaction (PCR) is used in directed sequencing for the discovery of novel polymorphisms. As the first step in PCR directed sequencing, effective PCR pr...
Kelvin Li, Anushka Brownley, Timothy B. Stockwell,...
JCC
2008
91views more  JCC 2008»
13 years 10 months ago
An improved pairwise decomposable finite-difference Poisson-Boltzmann method for computational protein design
Abstract: Our goal is to develop accurate electrostatic models that can be implemented in current computational protein design protocols. To this end, we improve upon a previously ...
Christina L. Vizcarra, Naigong Zhang, Shannon A. M...
ASPLOS
2000
ACM
14 years 2 months ago
Architecture and design of AlphaServer GS320
This paper describes the architecture and implementation of the AlphaServer GS320, a cache-coherent non-uniform memory access multiprocessor developed at Compaq. The AlphaServer G...
Kourosh Gharachorloo, Madhu Sharma, Simon Steely, ...