Sciweavers

1369 search results - page 69 / 274
» A Practical Implementation of the Timing Attack
Sort
View
115
Voted
CORR
2002
Springer
144views Education» more  CORR 2002»
15 years 14 days ago
Polynomial Time Data Reduction for Dominating Set
Dealing with the NP-complete Dominating Set problem on graphs, we demonstrate the power of data reduction by preprocessing from a theoretical as well as a practical side. In parti...
Jochen Alber, Michael R. Fellows, Rolf Niedermeier
125
Voted
ESWS
2008
Springer
15 years 2 months ago
An Ontology for Software Models and Its Practical Implications for Semantic Web Reasoning
Ontology-Driven Software Development (ODSD) advocates using ontologies for capturing knowledge about a software system at development time. So far, ODSD approaches have mainly focu...
Matthias Bräuer, Henrik Lochmann
118
Voted
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
15 years 2 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
139
Voted
CASCON
1992
163views Education» more  CASCON 1992»
15 years 1 months ago
Practical metaprogramming
Metaprogramming is the process of specifying generic software source templates from which classes of software components, or parts thereof, can be automatically instantiated to pr...
James R. Cordy, Medha Shukla
105
Voted
ICDCS
2009
IEEE
15 years 9 months ago
A Practical Study of Regenerating Codes for Peer-to-Peer Backup Systems
In distributed storage systems, erasure codes represent an attractive solution to add redundancy to stored data while limiting the storage overhead. They are able to provide the s...
Alessandro Duminuco, Ernst W. Biersack