Sciweavers

2472 search results - page 419 / 495
» Parallel Key Exchange
Sort
View
137
Voted
MICRO
2003
IEEE
148views Hardware» more  MICRO 2003»
15 years 8 months ago
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation...
Jun Yang 0002, Youtao Zhang, Lan Gao
112
Voted
MTDT
2003
IEEE
105views Hardware» more  MTDT 2003»
15 years 8 months ago
A Testability-Driven Optimizer and Wrapper Generator for Embedded Memories
Memory cores (especially SRAM cores) used on a system chip usually come from a memory compiler. Commercial memory compilers have their limitation— a large memory may need to be ...
Rei-Fu Huang, Li-Ming Denq, Cheng-Wen Wu, Jin-Fu L...
106
Voted
PG
2003
IEEE
15 years 8 months ago
Iso-Splatting: A Point-Based Alternative to Isosurface Visualization
We present a new approach to isosurface visualization that we call “iso-splatting.” We use point primitives for representing and rendering isosurfaces. The method consists of ...
Christopher S. Co, Bernd Hamann, Kenneth I. Joy
93
Voted
DEBS
2003
ACM
15 years 7 months ago
Relational subscription middleware for Internet-scale publish-subscribe
We present a design of a distributed publish-subscribe system that extends the functionality of messaging middleware with “relational subscriptions”, to support timely updates...
Yuhui Jin, Robert E. Strom
100
Voted
ESA
2003
Springer
94views Algorithms» more  ESA 2003»
15 years 7 months ago
Semi-clairvoyant Scheduling
In [2] it was shown that the obvious semi-clairvoyant generalization of the Shortest Processing Time is O(1)-competitive with respect to average stretch on a single machine. In [2...
Luca Becchetti, Stefano Leonardi, Alberto Marchett...