Sciweavers

8503 search results - page 1559 / 1701
» Secure Software Architectures
Sort
View
CASES
2003
ACM
14 years 2 months ago
AES and the cryptonite crypto processor
CRYPTONITE is a programmable processor tailored to the needs of crypto algorithms. The design of CRYPTONITE was based on an in-depth application analysis in which standard crypto ...
Dino Oliva, Rainer Buchty, Nevin Heintze
MSWIM
2003
ACM
14 years 2 months ago
Parallel adaptive mobile web clipping
– Wireless mobile access to the Internet is an indispensable tool for private and corporate users alike; but both industry and academia recognize the need for better service. Imp...
Alex Vrenios
PADS
2003
ACM
14 years 2 months ago
Scalable RTI-Based Parallel Simulation of Networks
Federated simulation interfaces such as the High Level Architecture (HLA) were designed for interoperability, and as such are not traditionally associated with highperformance com...
Kalyan S. Perumalla, Alfred Park, Richard M. Fujim...
SC
2003
ACM
14 years 2 months ago
Application Steering in a Collaborative Environment
In this showcase we will present live running simulations which are integrated into the Access Grid in a variety of different ways. An example of this is the use of vncto distrib...
John Brooke, Thomas Eickermann, Uwe Wössner
SENSYS
2003
ACM
14 years 2 months ago
Minimum-energy asynchronous dissemination to mobile sinks in wireless sensor networks
Data dissemination from sources to sinks is one of the main functions in sensor networks. In this paper, we propose SEAD, a Scalable Energy-efficient Asynchronous Dissemination pr...
Hyung Seok Kim, Tarek F. Abdelzaher, Wook Hyun Kwo...
« Prev « First page 1559 / 1701 Last » Next »