Sciweavers

488 search results - page 12 / 98
» REDUCE Meets CAMAL
Sort
View
ICCS
2009
Springer
14 years 3 months ago
Hiding Communication Latency with Non-SPMD, Graph-Based Execution
Reformulating an algorithm to mask communication delays is crucial in maintaining scalability, but traditional solutions embed the overlap strategy into the application. We present...
Jacob Sorensen, Scott B. Baden
NCA
2003
IEEE
14 years 1 months ago
On Scalable Information Retrieval Systems
Scalable information retrieval systems are crucial to meeting the growing volumes of data. We describe work done to facilitate scalability by reducing duplication, providing integ...
Ophir Frieder, David A. Grossman, Abdur Chowdhury
COMPSAC
2002
IEEE
14 years 1 months ago
Distributed Agent Architecture for Port Automation
In the near future, container ports will no longer be able to expand into the surrounding land and will thus be unable to meet the storage requirements due to the boom in world tr...
Tom Thurston, Huosheng Hu
CHES
2001
Springer
98views Cryptology» more  CHES 2001»
14 years 28 days ago
Attacks on Cryptoprocessor Transaction Sets
Attacks are presented on the IBM 4758 CCA and the Visa Security Module. Two new attack principles are demonstrated. Related key attacks use known or chosen differences between two...
Mike Bond
DATE
2008
IEEE
104views Hardware» more  DATE 2008»
14 years 2 months ago
A Novel Approach for EMI Design of Power Electronics
The placement of passive components significantly influences the EMI behavior of power electronic systems. Particularly filter components are affected by magnetic field coupling r...
Bernd Stube, Bernd Schröder, Eckart Hoene, An...