Academic literature on the topic 'HAShCache'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'HAShCache.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "HAShCache"
Patil, Adarsh, and Ramaswamy Govindarajan. "HAShCache." ACM Transactions on Architecture and Code Optimization 14, no. 4 (December 20, 2017): 1–26. http://dx.doi.org/10.1145/3158641.
Full textMeneghetti, Alessio, Massimiliano Sala, and Daniele Taufer. "A Survey on PoW-based Consensus." Annals of Emerging Technologies in Computing 4, no. 1 (January 1, 2020): 8–18. http://dx.doi.org/10.33166/aetic.2020.01.002.
Full textCurran, Kevin, and John Honan. "Eliminating the Volume of Spam E-Mails Using a Hashcash-Based Solution." Information Systems Security 15, no. 2 (May 1, 2006): 22–41. http://dx.doi.org/10.1201/1086.1065898x/46051.15.2.20060501/93406.5.
Full textMeneghetti, Alessio, Massimiliano Sala, and Daniele Taufer. "A New ECDLP-Based PoW Model." Mathematics 8, no. 8 (August 12, 2020): 1344. http://dx.doi.org/10.3390/math8081344.
Full textShinde, Siddhesh, and Asst Prof Gauri Ansurkar. "USE OF BLOCKCHAIN IN VOTING SYSTEM." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 04 (April 11, 2023). http://dx.doi.org/10.55041/ijsrem18868.
Full textDissertations / Theses on the topic "HAShCache"
Patil, Adarsh. "Heterogeneity Aware Shared DRAM Cache for Integrated Heterogeneous Architectures." Thesis, 2017. http://etd.iisc.ac.in/handle/2005/4124.
Full textBook chapters on the topic "HAShCache"
Curran, Kevin, and John Honan. "Fighting the Problem of Unsolicited E-Mail Using a Hashcash Proof-of-Work Approach." In Business Data Communications and Networking, 346–74. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-274-9.ch014.
Full textConference papers on the topic "HAShCache"
Rahimpour, Sonbol, and Majid Khabbazian. "Hashcashed Reputation with Application in Designing Watchtowers." In 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2021. http://dx.doi.org/10.1109/icbc51069.2021.9461123.
Full textViolaris, George, and Ioanna Dionysiou. "Out-of-Band Authentication Model with Hashcash Brute-Force Prevention." In 2014 IEEE International Conference on High Performance Computing and Communications (HPCC), 2014 IEEE 6th International Symposium on Cyberspace Safety and Security (CSS) and 2014 IEEE 11th International Conference on Embedded Software and Systems (ICESS). IEEE, 2014. http://dx.doi.org/10.1109/hpcc.2014.133.
Full text