Sciweavers

17390 search results - page 3423 / 3478
» Distributed Data Clustering
Sort
View
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
14 years 18 days ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
ASPLOS
1992
ACM
14 years 18 days ago
Non-Volatile Memory for Fast, Reliable File Systems
Given the decreasing cost of non-volatile RAM (NVRAM), by the late 1990's it will be feasible for most workstations to include a megabyte or more of NVRAM, enabling the desig...
Mary Baker, Satoshi Asami, Etienne Deprit, John K....
MM
1994
ACM
90views Multimedia» more  MM 1994»
14 years 17 days ago
Scheduling Policies for an On-Demand Video Server with Batching
In an on-demand video server environment, clients make requests for movies to a centralized video server. Due to the stringent response time requirements, continuous delivery of a...
Asit Dan, Dinkar Sitaram, Perwez Shahabuddin
ASPLOS
1989
ACM
14 years 17 days ago
Architecture and Compiler Tradeoffs for a Long Instruction Word Microprocessor
A very long instruction word (VLIW) processorexploits parallelism by controlling multiple operations in a single instruction word. This paper describes the architecture and compil...
Robert Cohn, Thomas R. Gross, Monica S. Lam, P. S....
PLDI
1990
ACM
14 years 16 days ago
A Fresh Look at Optimizing Array Bound Checking
- This paper describes techniques for optimizing range checks performed to detect array bound violations. In addition to the elimination of range check:s, the optimizations discuss...
Rajiv Gupta
« Prev « First page 3423 / 3478 Last » Next »