Sciweavers

1040 search results - page 155 / 208
» Resource Usage Verification
Sort
View
118
Voted
TACAS
2007
Springer
105views Algorithms» more  TACAS 2007»
15 years 8 months ago
Hoare Logic for Realistically Modelled Machine Code
This paper presents a mechanised Hoare-style programming logic framework for assembly level programs. The framework has been designed to fit on top of operational semantics of rea...
Magnus O. Myreen, Michael J. C. Gordon
113
Voted
WWIC
2007
Springer
156views Communications» more  WWIC 2007»
15 years 8 months ago
ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks
Providing security services for wireless sensor networks plays a vital role in secure network operation especially when sensor networks are deployed in hostile areas. In order to p...
Tran Thanh Dai, Choong Seon Hong
119
Voted
ASAP
2006
IEEE
110views Hardware» more  ASAP 2006»
15 years 8 months ago
Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards
This paper proposes different low-cost coprocessors for public key authentication on 8-bit smart cards. Elliptic curve cryptography is used for its efficiency per bit of key and ...
Guerric Meurice de Dormale, Renaud Ambroise, David...
113
Voted
CCGRID
2006
IEEE
15 years 8 months ago
Network Bandwidth Predictor (NBP): A System for Online Network performance Forecasting
The applicability of network-based computing depends on the availability of the underlying network bandwidth. However, network resources are shared and the available network bandw...
Alaknantha Eswaradass, Xian-He Sun, Ming Wu
86
Voted
CLUSTER
2006
IEEE
15 years 8 months ago
I/O Scheduling Service for Multi-Application Clusters
Distributed applications, especially the ones being I/O intensive, often access the storage subsystem in a non-sequential way (stride requests). Since such behaviors lower the ove...
Adrien Lebre, Guillaume Huard, Yves Denneulin, Prz...