Sciweavers

SP
2002
IEEE
165views Security Privacy» more  SP 2002»
13 years 4 months ago
NINJA: Java for high performance numerical computing
When Java was first introduced, there was a perception that its many benefits came at a significant performance cost. In the particularly performance-sensitive field of numerical ...
José E. Moreira, Samuel P. Midkiff, Manish ...
SP
2002
IEEE
139views Security Privacy» more  SP 2002»
13 years 4 months ago
Mobile objects in Java
Mobile Objects in Java provides support for object mobility in Java. Similarly to the RMI technique, a notion of client-side stub, called startpoint, is used to communicate transp...
Luc Moreau, Daniel Ribbens
SP
2002
IEEE
134views Security Privacy» more  SP 2002»
13 years 4 months ago
Performance engineering, PSEs and the GRID
Performance Engineering is concerned with the reliable prediction and estimation of the performance of scientific and engineering applications on a variety of parallel and distrib...
Tony Hey, Juri Papay
SP
2002
IEEE
13 years 4 months ago
VLAM-G: A Grid-based virtual laboratory
The Grid-based Virtual Laboratory AMsterdam (VLAM-G), provides a science portal for distributed analysis in applied scientific research. It offers scientists experiment control, d...
Hamideh Afsarmanesh, Robert G. Belleman, Adam Bell...
SP
2002
IEEE
114views Security Privacy» more  SP 2002»
13 years 4 months ago
HMM-based techniques for speech segments extraction
The goal of the speech segments extraction process is to separate acoustic events of interest (the speech segment to be recognised) in a continuously recorded signal from other par...
Waleed H. Abdulla
SP
2002
IEEE
13 years 4 months ago
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks
Dawn Xiaodong Song, J. D. Tygar, David Zuckerman
SP
2002
IEEE
132views Security Privacy» more  SP 2002»
13 years 4 months ago
Automated Generation and Analysis of Attack Graphs
Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richar...
SP
2002
IEEE
107views Security Privacy» more  SP 2002»
13 years 4 months ago
P5: A Protocol for Scalable Anonymous Communication
Rob Sherwood, Bobby Bhattacharjee, Aravind Sriniva...
SP
2002
IEEE
143views Security Privacy» more  SP 2002»
13 years 4 months ago
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards
In this paper, we introduce a new class of side
Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, S...
SP
2002
IEEE
140views Security Privacy» more  SP 2002»
13 years 4 months ago
Efficient Multicast Packet Authentication Using Signature Amortization
We describe a novel method for authenticating multicast packets that is robust against packet loss. Our main focus is to minimize the size of the communication overhead required t...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...