Sciweavers

469 search results - page 70 / 94
» On Cipher Design Based on Switchable Controlled Operations
Sort
View
138
Voted
DAC
2007
ACM
16 years 3 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...
187
Voted
IFIP
2009
Springer
15 years 9 months ago
Network Awareness in P2P-TV Applications
The increasing popularity of applications for video-streaming based on P2P paradigm (P2P-TV) is raising the interest of both broadcasters and network operators. The former see a pr...
Stefano Traverso, Emilio Leonardi, Marco Mellia, M...
126
Voted
PPDP
2009
Springer
15 years 9 months ago
Set functions for functional logic programming
We propose a novel approach to encapsulate non-deterministic computations in functional logic programs. Our approach is based on set functions that return the set of all the resul...
Sergio Antoy, Michael Hanus
118
Voted
ICPADS
2007
IEEE
15 years 9 months ago
Federated clusters using the transparent remote Execution (TREx) environment
- Due to the increasing complexity of scientific models, large-scale simulation tools often require a critical amount of computational power to produce results in a reasonable amou...
Richert Wang, Enrique Cauich, Isaac D. Scherson
99
Voted
CC
2007
Springer
15 years 9 months ago
A Declarative Framework for Analysis and Optimization
DeepWeaver-1 is a tool supporting cross-cutting program analysis and transformation components, called “weaves”. Like an aspect, a DeepWeaver weave consists of a query part, an...
Henry Falconer, Paul H. J. Kelly, David M. Ingram,...