Sciweavers

274 search results - page 35 / 55
» Resource Instantiation Policies for Software Process Environ...
Sort
View
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
13 years 11 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
CCIA
2009
Springer
13 years 8 months ago
mWater: a Sandbox for Agreement Technologies
The management of natural resources is an intricate and consequential task. In particular, water management is at the forefront of public policy priorities in many countries becaus...
Antonio Garrido, Adriana Giret, Pablo Noriega
ECBS
2005
IEEE
179views Hardware» more  ECBS 2005»
14 years 1 months ago
Prototype of Fault Adaptive Embedded Software for Large-Scale Real-Time Systems
This paper describes a comprehensive prototype of large-scale fault adaptive embedded software developed for the proposed Fermilab BTeV high energy physics experiment. Lightweight...
Derek Messie, Mina Jung, Jae C. Oh, Shweta Shetty,...
EUROSYS
2007
ACM
14 years 4 months ago
Macroprogramming heterogeneous sensor networks using cosmos
In this paper, we present COSMOS, a novel architecture for macroprogramming heterogeneous sensor network systems. Macroprogramming entails aggregate system behavior specification...
Asad Awan, Suresh Jagannathan, Ananth Grama
HPDC
2002
IEEE
14 years 17 days ago
Decoupling Computation and Data Scheduling in Distributed Data-Intensive Applications
In high energy physics, bioinformatics, and other disciplines, we encounter applications involving numerous, loosely coupled jobs that both access and generate large data sets. So...
Kavitha Ranganathan, Ian T. Foster