• PRINCE

  • Referenced in 58 articles [sw13240]
  • latency block cipher for pervasive computing applications. Extended abstract. This paper presents a block cipher ... Such ciphers are desirable for many future pervasive applications with real-time security needs...
  • Me-services

  • Referenced in 8 articles [sw01399]
  • management of services in pervasive environments. Increasing computational capabilities and decreasing costs of commonly used ... networking technologies, will help realize the pervasive computing paradigm. In this paper, we present ... management, and trust based security in pervasive computing environments...
  • A2U2

  • Referenced in 2 articles [sw23607]
  • play with emerging ubiquitous and pervasive computing devices, such as low cost passive Radio Frequency...
  • COROR

  • Referenced in 2 articles [sw12479]
  • application of semantic web technologies in pervasive computing, and the desire to push intelligence towards...
  • PaQuBE

  • Referenced in 5 articles [sw06998]
  • exploited from modern computer architectures, from pervasive multicore boxes to clusters and grids, to solve...
  • iMapReduce

  • Referenced in 2 articles [sw27957]
  • Computing Framework for Iterative Computation. Iterative computation is pervasive in many applications such as data ... data records. This poses demand of distributed computing frameworks for processing massive data sets...
  • ALDOR

  • Referenced in 27 articles [sw01220]
  • been used to develop a number of computer algebra libraries. Originally known as A#, Aldor ... constructed and manipulated within programs. Pervasive support for dependent types allows static checking of dynamic...
  • DotGrid

  • Referenced in 2 articles [sw12833]
  • resources are becoming the de facto computing platform for solving large-scale problems in science ... idle cycles of pervasive desktop PC systems to increase the available computing power. In this...
  • PBGL

  • Referenced in 8 articles [sw04182]
  • structures, algorithms, and syntax for distributed, parallel computation that the BGL offers for sequential programs ... Open Systems Lab, part of the Pervasive Technologies Institute at Indiana University...
  • MaD2

  • Referenced in 1 article [sw19555]
  • MaD2: an ultra-performance stream cipher for pervasive data encryption. MaD2 is an ultra-performance ... cycle per byte on a typical personal computer. With an encryption/decryption rate significantly higher than...
  • Parsl

  • Referenced in 3 articles [sw28682]
  • Parsl: Pervasive Parallel Programming in Python. High-level programming languages such as Python are increasingly ... coupled with the growing need for parallel computing (e.g., due to big data...
  • SakerGrid

  • Referenced in 2 articles [sw13436]
  • such simulation is becoming an increasingly pervasive technology across major business sectors. This has been ... address this issue using a dedicated Grid Computing System (SakerGrid) to support the deployment...
  • CBEAM

  • Referenced in 2 articles [sw15633]
  • even if the inverse is not explicitly computed in an implementation, its degree plays ... compact “all-in-one” primitive for pervasive security...
  • WITS

  • Referenced in 0 articles [sw24728]
  • WITS: an IoT-endowed computational framework for activity recognition in personalized smart homes. Over ... attentions. Along with the recent prevalence of pervasive e-Health in various applications such...
  • CoCoA

  • Referenced in 621 articles [sw00143]
  • CoCoA is a system for Computations in Commutative...
  • Isabelle

  • Referenced in 606 articles [sw00454]
  • Isabelle is a generic proof assistant. It allows...
  • jETI

  • Referenced in 15 articles [sw00471]
  • We present jETI, a redesign of the Electronic...
  • MapReduce

  • Referenced in 250 articles [sw00546]
  • MapReduce is a new parallel programming model initially...
  • MEEP

  • Referenced in 9 articles [sw00569]
  • MEEP: A flexible free-software package for electromagnetic...
  • MetaGame

  • Referenced in 10 articles [sw00572]
  • Failing model checking runs should be accompanied by...