Sciweavers

2024 search results - page 373 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
DSN
2003
IEEE
14 years 1 months ago
A Voltage Scheduling Heuristic for Real-Time Task Graphs
Energy constrained complex real-time systems are becoming increasingly important in defense, space, and consumer applications. In this paper, we present a sensible heuristic to ad...
Diganta Roychowdhury, Israel Koren, C. Mani Krishn...
AINA
2010
IEEE
14 years 1 months ago
Context-Aware Mobile Services Transactions
— with the ubiquity of handheld devices people can now access information and conduct online transactions virtually anywhere and anytime. In such flexible but less reliable envir...
Muhammad Younas, Soraya Kouadri Mostéfaoui
IPPS
1999
IEEE
14 years 28 days ago
An Adaptive, Fault-Tolerant Implementation of BSP for JAVA-Based Volunteer Computing Systems
Abstract. In recent years, there has been a surge of interest in Javabased volunteer computing systems, which aim to make it possible to build very large parallel computing network...
Luis F. G. Sarmenta
ACMSE
1995
ACM
14 years 6 days ago
Database management for multimedia distributed collaborative writing
{ Traditional computer applications have been designed to be run by one user at a time who does some work in a single medium, such as ASCII text, and very little regard has been gi...
A. Wesley Wear, Yu Gong, Kai H. Chang
IJNSEC
2008
103views more  IJNSEC 2008»
13 years 8 months ago
On Cipher Design Based on Switchable Controlled Operations
This paper concerns the problem of reducing the implementation cost of the switchable data-dependent operations (SDDOs) that are a new cryptographic primitive oriented to the desi...
Nikolay A. Moldovyan