Sciweavers

17789 search results - page 44 / 3558
» Exceptional Use Cases
Sort
View
IEEEPACT
2003
IEEE
14 years 29 days ago
Reducing Datapath Energy through the Isolation of Short-Lived Operands
We present a technique for reducing the power dissipation in the course of writebacks and committments in a datapath that uses a dedicated architectural register file (ARF) to hol...
Dmitry Ponomarev, Gurhan Kucuk, Oguz Ergin, Kanad ...
CCS
2003
ACM
14 years 28 days ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
JSS
2011
150views more  JSS 2011»
13 years 2 months ago
A novel general framework for automatic and cost-effective handling of recoverable temporal violations in scientific workflow sy
Due to the complex nature of scientific workflow environments, temporal violations often take place and may severely reduce the timeliness of the execution’s results. To handle ...
Xiao Liu, Zhiwei Ni, Zhangjun Wu, Dong Yuan, Jinju...
DAGSTUHL
2008
13 years 9 months ago
Interval Arithmetic Using SSE-2
ABSTRACT. We present an implementation of double precision interval arithmetic using the single-instruction-multiple-data SSE-2 instruction and register set extensions. The impleme...
Branimir Lambov
ECOOP
2009
Springer
14 years 8 months ago
Remote Batch Invocation for Compositional Object Services
Abstract. Because Remote Procedure Calls do not compose efficiently, designers of distributed object systems use Data Transfer and Remote Fac?ade patterns to create large-granulari...
Ali Ibrahim, Yang Jiao, Eli Tilevich, William R. C...