Learn More
This paper describes the architecture and implementation of the AlphaServer GS320, a cache-coherent non-uniform memory access multiprocessor developed at Compaq. The AlphaServer GS320 architecture is specifically targeted at medium-scale multiprocessing with 32 to 64 processors. Each node in the design consists of four Alpha 21264 processors, up to 32GB of(More)
We pose as a challenge to the verification community the problem of finding errors in the specification of a complicated cache-coherence protocol. It specifies a simplified version of the protocol used in an actual multiprocessor computer, except with one error deliberately introduced and another introduced by accident. The protocol and the memory model it(More)
Wireless networks are playing important role for development and ease of use of human society. It also gets a lot of attention from research community towards the betterment of applications. A wide range of applications make it very popular and backbone of technology system i.e. GSM, Bluetooth, Wi-Fi etc. In order to categorization of applications, this(More)
The evolutionary based computational approach has been matured into an extensive collection of concepts and techniques with The hype in The complexities of The problems which could not be easily dealt by The classical approach. The effectiveness and efficiency of these modern approaches are making them popular in The field of research and development. in(More)
Privacy of the information is one of the major issues in digital world. However it is responsibility of the owner of the information to secure it from disclosure and unauthorized access. The main motivation behind this protocol is to ensures individual privacy along with integrity of the information. To achieve such security requirements a sharing scheme(More)
With the increase in usage of ATM and the enhancement in technical strengths of the entire system including security aspects, the destructive aspects also came into existence in parallel. The ATM owners are worried for the logical and physical security of ATM, just after its implementation and usage. The entire security system demands the support of the(More)
Authentication is basically a way by which sender and recipient must prove their identities to each other. Image authentication verifies the originality of an image by detecting malicious manipulations. Reliable image authentication technology must be able to protect an image from time it was first produced until the final stage of use. In this paper we(More)