Sciweavers

2642 search results - page 182 / 529
» Merge-by-Wire: Algorithms and System Support
Sort
View
ISCI
2008
104views more  ISCI 2008»
15 years 4 months ago
Unconditionally secure cryptosystems based on quantum cryptography
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen
MOBICOM
2005
ACM
15 years 10 months ago
Effects of routing computations in content-based routing networks with mobile data sources
This paper presents the first quantitative evaluation of the role of routing computations on performance when mobility is introduced to a content-based routing network. Additiona...
Vinod Muthusamy, Milenko Petrovic, Hans-Arno Jacob...
WWW
2004
ACM
16 years 5 months ago
P-tree: a p2p index for resource discovery applications
We propose a new distributed, fault-tolerant Peer-to-Peer index structure for resource discovery applications called the P-tree. P-trees efficiently support range queries in addit...
Adina Crainiceanu, Prakash Linga, Johannes Gehrke,...
DATE
1998
IEEE
109views Hardware» more  DATE 1998»
15 years 9 months ago
Cross-Level Hierarchical High-Level Synthesis
This paper presents a new approach to cross-level hierarchical high-level synthesis. A methodology is presented, that supports the efficient synthesis of hierarchical specified sy...
Oliver Bringmann, Wolfgang Rosenstiel
FPL
2009
Springer
105views Hardware» more  FPL 2009»
15 years 8 months ago
Run-time resource management in fault-tolerant network on reconfigurable chips
This paper investigates the challenges of run-time resource management in future coarse-grained network-onreconfigurable-chips (NoRCs). Run-time reconfiguration is a key feature e...
Mohammad Hosseinabady, José L. Nú&nt...