Sciweavers

2702 search results - page 351 / 541
» Message from the Editor
Sort
View
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
15 years 9 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
WISE
2005
Springer
15 years 9 months ago
Xebu: A Binary Format with Schema-Based Optimizations for XML Data
XML is currently being used as the message syntax for Web services. To enable small mobile devices to use Web services, this XML use must not be too resource-consuming. Due to seve...
Jaakko Kangasharju, Sasu Tarkoma, Tancred Lindholm
150
Voted
WONS
2005
IEEE
15 years 9 months ago
Broadcasting in Hybrid Ad Hoc Networks
In this paper, we consider hybrid ad hoc networks, which are composed of two kinds of nodes, regular ones and nodes with additional capabilities. For example, multi-hop cellular a...
François Ingelrest, David Simplot-Ryl, Ivan...
OZCHI
2005
ACM
15 years 9 months ago
Technology for the humdrum: trajectories, interactional needs and a care setting
We report on a care setting where staff looking after ex-psychiatric patients were supported by mobile and stationery communications technology (e.g. mobile phones, a messaging sy...
Connor Graham, Keith Cheverst, Mark Rouncefield
SC
2005
ACM
15 years 9 months ago
An Application-Based Performance Characterization of the Columbia Supercluster
Columbia is a 10,240-processor supercluster consisting of 20 Altix nodes with 512 processors each, and currently ranked as one of the fastest computers in the world. In this paper...
Rupak Biswas, M. Jahed Djomehri, Robert Hood, Haoq...