Sciweavers

7047 search results - page 1295 / 1410
» Focusing on Binding and Computation
Sort
View
ASIACRYPT
2011
Springer
12 years 10 months ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
CODES
2011
IEEE
12 years 10 months ago
DistRM: distributed resource management for on-chip many-core systems
The trend towards many-core systems comes with various issues, among them their highly dynamic and non-predictable workloads. Hence, new paradigms for managing resources of many-c...
Sebastian Kobbe, Lars Bauer, Daniel Lohmann, Wolfg...
EDOC
2011
IEEE
12 years 10 months ago
Modeling Contextual Concerns in Enterprise Architecture
Abstract—Enterprise Architecture approaches are used to provide rigorous descriptions of the organization-wide environment, manage the alignment of deployed services to the organ...
Gonçalo Antunes, José Barateiro, Chr...
ICDCS
2011
IEEE
12 years 9 months ago
Intelligent Placement of Datacenters for Internet Services
—Popular Internet services are hosted by multiple geographically distributed datacenters. The location of the datacenters has a direct impact on the services’ response times, c...
Iñigo Goiri, Kien Le, Jordi Guitart, Jordi ...
EDBT
2012
ACM
214views Database» more  EDBT 2012»
12 years 16 days ago
An optimization framework for map-reduce queries
We present an effective optimization framework for general SQLlike map-reduce queries, which is based on a novel query algebra and uses a small number of higher-order physical ope...
Leonidas Fegaras, Chengkai Li, Upa Gupta
« Prev « First page 1295 / 1410 Last » Next »