Sciweavers

35419 search results - page 6983 / 7084
» How are we doing
Sort
View
135
Voted
IACR
2011
113views more  IACR 2011»
14 years 3 months ago
Implementing 4-Dimensional GLV Method on GLS Elliptic Curves with j-Invariant 0
Abstract. The Gallant-Lambert-Vanstone (GLV) method is a very efcient technique for accelerating point multiplication on elliptic curves with eciently computable endomorphisms. G...
Zhi Hu, Patrick Longa, Maozhi Xu
228
Voted
ICA3PP
2011
Springer
14 years 3 months ago
Performance Analysis of Preemption-Aware Scheduling in Multi-cluster Grid Environments
Abstract. Resource provisioning is one of the main challenges in resource sharing environments such as multi-cluster Grids. In these environments each cluster serves requests from ...
Mohsen Amini Salehi, Bahman Javadi, Rajkumar Buyya
144
Voted
POPL
2012
ACM
13 years 11 months ago
The marriage of bisimulations and Kripke logical relations
There has been great progress in recent years on developing effective techniques for reasoning about program equivalence in ML-like languages—that is, languages that combine fea...
Chung-Kil Hur, Derek Dreyer, Georg Neis, Viktor Va...
156
Voted
SIGCOMM
2012
ACM
13 years 6 months ago
TUBE: time-dependent pricing for mobile data
The two largest U.S. wireless ISPs have recently moved towards usage-based pricing to better manage the growing demand on their networks. Yet usage-based pricing still requires IS...
Sangtae Ha, Soumya Sen, Carlee Joe-Wong, Youngbin ...
170
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
Sherlock is around: Detecting network failures with local evidence fusion
—Traditional approaches for wireless sensor network diagnosis are mainly sink-based. They actively collect global evidences from sensor nodes to the sink so as to conduct central...
Qiang Ma, Kebin Liu, Xin Miao, Yunhao Liu
« Prev « First page 6983 / 7084 Last » Next »