Sciweavers

1147 search results - page 176 / 230
» Transformation of Access Rights
Sort
View
MICRO
2000
IEEE
176views Hardware» more  MICRO 2000»
13 years 10 months ago
An Advanced Optimizer for the IA-64 Architecture
level of abstraction, compared with the program representation for scalar optimizations. For example, loop unrolling and loop unrolland-jam transformations exploit the large regist...
Rakesh Krishnaiyer, Dattatraya Kulkarni, Daniel M....
TVCG
1998
125views more  TVCG 1998»
13 years 10 months ago
Structure-Significant Representation of Structured Datasets
—Numerical simulation of physical phenomena is now an accepted way of scientific inquiry. However, the field is still evolving, with a profusion of new solution and grid-generati...
Raghu Machiraju, Zhifan Zhu, Bryan Fry, Robert J. ...
PKC
2009
Springer
172views Cryptology» more  PKC 2009»
14 years 11 months ago
CCA-Secure Proxy Re-encryption without Pairings
ded abstract of this paper appears in PKC 2009, S. Jarecki, G. Tsudik (Eds.), volume 5443 of LNCS, pp. 357-376, Sringer-Verlag, 2009. CCA-Secure Proxy Re-Encryption without Pairing...
Jun Shao, Zhenfu Cao
IPPS
2009
IEEE
14 years 5 months ago
High-order stencil computations on multicore clusters
Stencil computation (SC) is of critical importance for broad scientific and engineering applications. However, it is a challenge to optimize complex, highorder SC on emerging clus...
Liu Peng, Richard Seymour, Ken-ichi Nomura, Rajiv ...
ICSOC
2009
Springer
14 years 5 months ago
Engage: Engineering Service Modes with WS-Engineer and Dino
In this demonstration1 we present an approach to engineering service brokering requirements and capabilities using the concepts of Service Modes. The demonstration illustrates buil...
Howard Foster, Arun Mukhija, David S. Rosenblum, S...