Sciweavers

5056 search results - page 931 / 1012
» Network Coding Theory
Sort
View
ISCAS
2003
IEEE
114views Hardware» more  ISCAS 2003»
15 years 7 months ago
On the hardware implementations of the SHA-2 (256, 384, 512) hash functions
Couple to the communications wired and unwired networks growth, is the increasing demand for strong secure data transmission. New cryptographic standards are developed, and new en...
Nicolas Sklavos, Odysseas G. Koufopavlou
GCC
2003
Springer
15 years 7 months ago
A Collaborative Multimedia Authoring System
We developed a SMIL-based collaborative multimedia authoring tool supporting a mechanism for conceptually representing the temporal relations between different media. Among the ma...
Mee Young Sung, Do Hyung Lee
ICCSA
2003
Springer
15 years 7 months ago
Parallel CLUSTAL W for PC Clusters
This paper presents a parallel version of CLUSTAL W, called pCLUSTAL. In contrast to the commercial SGI parallel Clustal, which requires an expensive shared memory SGI multiprocess...
James Cheetham, Frank K. H. A. Dehne, Sylvain Pitr...
ACSAC
2002
IEEE
15 years 7 months ago
Enforcing Resource Bound Safety for Mobile SNMP Agents
The integration of mobile agents with SNMP creates significant advantages for the management of complex networks. Nevertheless, the security concerns of mobile agent technology l...
Weijiang Yu, Aloysius K. Mok
CCGRID
2002
IEEE
15 years 7 months ago
Using TOP-C and AMPIC to Port Large Parallel Applications to the Computational Grid
Porting large applications to distributed computing platforms is a challenging task from a software engineering perspective. The Computational Grid has gained tremendous popularit...
Gene Cooperman, Henri Casanova, Jim Hayes, Thomas ...