Sciweavers

6770 search results - page 1248 / 1354
» How GPUs Work
Sort
View
ACSAC
2000
IEEE
14 years 1 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
HCW
2000
IEEE
14 years 1 months ago
Combining Workstations and Supercomputers to Support Grid Applications: The Parallel Tomography Experience
Computational Grids are becoming an increasingly important and powerful platform for the execution of largescale, resource-intensive applications. However, it remains a challenge ...
Shava Smallen, Walfredo Cirne, Jaime Frey, Francin...
ICCAD
2000
IEEE
102views Hardware» more  ICCAD 2000»
14 years 1 months ago
Provably Good Global Buffering Using an Available Buffer Block Plan
To implement high-performance global interconnect without impacting the performance of existing blocks, the use of buffer blocks is increasingly popular in structured-custom and b...
Feodor F. Dragan, Andrew B. Kahng, Ion I. Mandoiu,...
ICDCS
2000
IEEE
14 years 1 months ago
An Adaptive, Perception-Driven Error Spreading Scheme in Continuous Media Streaming
For transmission of continuous media (CM) streams such as audio and video over the Internet, a critical issue is that periodic network overloads cause bursty packet losses. Studie...
Srivatsan Varadarajan, Hung Q. Ngo, Jaideep Srivas...
IJCNN
2000
IEEE
14 years 1 months ago
EM Algorithms for Self-Organizing Maps
eresting web-available abstracts and papers on clustering: An Analysis of Recent Work on Clustering Algorithms (1999), Daniel Fasulo : This paper describes four recent papers on cl...
Tom Heskes, Jan-Joost Spanjers, Wim Wiegerinck
« Prev « First page 1248 / 1354 Last » Next »