Sciweavers

1369 search results - page 228 / 274
» A Practical Implementation of the Timing Attack
Sort
View
JCB
2007
92views more  JCB 2007»
14 years 10 months ago
Neighbor Joining Algorithms for Inferring Phylogenies via LCA Distances
Reconstructing phylogenetic trees efficiently and accurately from distance estimates is an ongoing challenge in computational biology from both practical and theoretical consider...
Ilan Gronau, Shlomo Moran
DPD
2002
97views more  DPD 2002»
14 years 10 months ago
Dictatorial Transaction Processing: Atomic Commitment Without Veto Right
The current standard in governing distributed transaction termination is the so-called Two-Phase Commit protocol (2PC). The first phase of 2PC is a voting phase, where the partici...
Maha Abdallah, Rachid Guerraoui, Philippe Pucheral
NPL
2000
105views more  NPL 2000»
14 years 10 months ago
Online Interactive Neuro-evolution
In standard neuro-evolution, a population of networks is evolved in a task, and the network that best solves the task is found. This network is then fixed and used to solve future...
Adrian K. Agogino, Kenneth O. Stanley, Risto Miikk...
97
Voted
TCAD
1998
126views more  TCAD 1998»
14 years 10 months ago
Iterative remapping for logic circuits
Abstract—This paper presents an aggressive optimization technique targeting combinational logic circuits. Starting from an initial implementation mapped on a given technology lib...
Luca Benini, Patrick Vuillod, Giovanni De Micheli
96
Voted
SIGIR
2008
ACM
14 years 9 months ago
ResIn: a combination of results caching and index pruning for high-performance web search engines
Results caching is an efficient technique for reducing the query processing load, hence it is commonly used in real search engines. This technique, however, bounds the maximum hit...
Gleb Skobeltsyn, Flavio Junqueira, Vassilis Placho...