Sciweavers

5790 search results - page 1028 / 1158
» Distributed programming with distributed authorization
Sort
View
IEEEPACT
2005
IEEE
14 years 2 months ago
Exploiting Coarse-Grained Parallelism to Accelerate Protein Motif Finding with a Network Processor
While general-purpose processors have only recently employed chip multiprocessor (CMP) architectures, network processors (NPs) have used heterogeneous multi-core architectures sin...
Ben Wun, Jeremy Buhler, Patrick Crowley
MICRO
2005
IEEE
123views Hardware» more  MICRO 2005»
14 years 2 months ago
A Criticality Analysis of Clustering in Superscalar Processors
Clustered machines partition hardware resources to circumvent the cycle time penalties incurred by large, monolithic structures. This partitioning introduces a long inter-cluster ...
Pierre Salverda, Craig B. Zilles
SKG
2005
IEEE
14 years 2 months ago
Converting the Industry Foundation Classes to the Web Ontology Language
The upcoming next generation of the internet, often referred to as the Semantic Web, will bring a lot of new technologies, one of which is the Web Ontology Language (OWL). One fea...
Hans Schevers, Robin Drogemuller
TRIDENTCOM
2005
IEEE
14 years 2 months ago
A Geography-Aware Scalable Community Wireless Network Test Bed
Wireless mesh networks have increasingly become an object of interest in recent years as a strong alternative to purely wired infrastructure networks and purely mobile wireless ne...
Bow-Nan Cheng, Shivkumar Kalyanaraman, Max Klein
WORDS
2005
IEEE
14 years 2 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
« Prev « First page 1028 / 1158 Last » Next »