Sciweavers

81 search results - page 4 / 17
» Trading computing power with ReGTime
Sort
View
JCP
2008
107views more  JCP 2008»
13 years 7 months ago
Data Analysis and Statistical Behaviors of Stock Market Fluctuations
In this paper, the data of Chinese stock markets is analyzed by the statistical methods and computer sciences. The fluctuations of stock prices and trade volumes are investigated b...
Jun Wang, Bingli Fan, Dongping Men
FPGA
1999
ACM
139views FPGA» more  FPGA 1999»
14 years 4 days ago
Trading Quality for Compile Time: Ultra-Fast Placement for FPGAs
The demand for high-speed FPGA compilation tools has occurred for three reasons: first, as FPGA device capacity has grown, the computation time devoted to placement and routing h...
Yaska Sankar, Jonathan Rose
IPPS
2007
IEEE
14 years 2 months ago
Performance Studies of a WebSphere Application, Trade, in Scale-out and Scale-up Environments
Scale-out approach, in contrast to scale-up approach (exploring increasing performance by utilizing more powerful shared-memory servers), refers to deployment of applications on a...
Hao Yu, José E. Moreira, Parijat Dube, I-Hs...
EUROPAR
2005
Springer
14 years 1 months ago
Cost / Performance Trade-Offs and Fairness Evaluation of Queue Mapping Policies
Whereas the established interconnection networks (ICTN) achieve low latency by operating in the linear region, i.e. oversizing the fabric, the recent strict cost and power constrai...
Teresa Nachiondo Frinós, Jose Flich, Jos&ea...
IACR
2011
132views more  IACR 2011»
12 years 7 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...