Sciweavers

12373 search results - page 2244 / 2475
» Semi-Logarithmic Number Systems
Sort
View
TOCS
2008
154views more  TOCS 2008»
15 years 4 months ago
Adaptive work-stealing with parallelism feedback
We present an adaptive work-stealing thread scheduler, ASTEAL, for fork-join multithreaded jobs, like those written using the Cilk multithreaded language or the Hood work-stealing...
Kunal Agrawal, Charles E. Leiserson, Yuxiong He, W...
JNCA
2007
125views more  JNCA 2007»
15 years 4 months ago
Distributed middleware architectures for scalable media services
The fusion of Multimedia and Internet technology has introduced an ever-increasing demand for large-scale reliable media services. This exposes the scalability limitations of curr...
Vana Kalogeraki, Demetrios Zeinalipour-Yazti, Dimi...
JOC
2007
133views more  JOC 2007»
15 years 4 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
JPDC
2007
167views more  JPDC 2007»
15 years 4 months ago
On the design of high-performance algorithms for aligning multiple protein sequences on mesh-based multiprocessor architectures
In this paper, we address the problem of multiple sequence alignment (MSA) for handling very large number of proteins sequences on mesh-based multiprocessor architectures. As the ...
Diana H. P. Low, Bharadwaj Veeravalli, David A. Ba...
TWC
2008
105views more  TWC 2008»
15 years 4 months ago
Receive Antenna Array Strategies in Fading and Interference: An Outage Probability Comparison
We explore tradeoffs between different reception strategies of multiple receive antennas in fading channels with co-channel interference (CCI). Our tradeoff analysis is based on ou...
Juan M. Romero-Jerez, Andrea J. Goldsmith
« Prev « First page 2244 / 2475 Last » Next »