Sciweavers

VLSID
2016
IEEE
70views VLSI» more  VLSID 2016»
10 years 12 days ago
Using Tweaks to Design Fault Resistant Ciphers
Side channel analysis and active fault analysis are now major threats to even mathematically robust cryptographic algorithms that are otherwise resistant to classical cryptanalysis...
VLSID
2016
IEEE
73views VLSI» more  VLSID 2016»
10 years 12 days ago
A Generic Implementation of Barriers Using Optical Interconnects
—Barriers have long been recognized as important performance-critical constructs in parallel applications. As a consequence, researchers have proposed fast implementations of bar...
VLDB
2016
ACM
88views Database» more  VLDB 2016»
10 years 12 days ago
Effective deep learning-based multi-modal retrieval
Wei Wang, Xiaoyan Yang, Beng Chin Ooi, Dongxiang Z...
VLDB
2016
ACM
59views Database» more  VLDB 2016»
10 years 12 days ago
epiC: an extensible and scalable system for processing Big Data
The Big Data problem is characterized by the so called 3V features: Volume - a huge amount of data, Velocity - a high data ingestion rate, and Variety - a mix of structured data, ...
Dawei Jiang, Sai Wu, Gang Chen, Beng Chin Ooi, Kia...
VLDB
2016
ACM
68views Database» more  VLDB 2016»
10 years 12 days ago
On k-Path Covers and their applications
For a directed graph G with vertex set V we call a subset C ⊆ V a k-(All-)Path Cover if C contains a node from any path consisting of k nodes. This paper considers the problem o...
Stefan Funke, André Nusser, Sabine Storandt