Sciweavers

1702 search results - page 283 / 341
» Using Nondeterminism to Design Efficient Deterministic Algor...
Sort
View
ISCAS
2003
IEEE
114views Hardware» more  ISCAS 2003»
14 years 2 months ago
On the hardware implementations of the SHA-2 (256, 384, 512) hash functions
Couple to the communications wired and unwired networks growth, is the increasing demand for strong secure data transmission. New cryptographic standards are developed, and new en...
Nicolas Sklavos, Odysseas G. Koufopavlou
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
14 years 1 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
CLUSTER
2009
IEEE
14 years 26 days ago
Analytical modeling and optimization for affinity based thread scheduling on multicore systems
Abstract--This paper proposes an analytical model to estimate the cost of running an affinity-based thread schedule on multicore systems. The model consists of three submodels to e...
Fengguang Song, Shirley Moore, Jack Dongarra
GLOBECOM
2007
IEEE
14 years 24 days ago
On Modeling VoIP Traffic in Broadband Networks
With the general trend towards ubiquitous access to the Internet, more users will prefer to make voice calls through the Internet. VoIP as the application which facilitates voice c...
Ehsan Haghani, Swades De, Nirwan Ansari
ICCAD
2007
IEEE
234views Hardware» more  ICCAD 2007»
14 years 24 days ago
Finding linear building-blocks for RTL synthesis of polynomial datapaths with fixed-size bit-vectors
Abstract: Polynomial computations over fixed-size bitvectors are found in many practical datapath designs. For efficient RTL synthesis, it is important to identify good decompositi...
Sivaram Gopalakrishnan, Priyank Kalla, M. Brandon ...