Sciweavers

3047 search results - page 356 / 610
» A Secure Distributed Search System
Sort
View
EUROPAR
2006
Springer
15 years 8 months ago
Private Virtual Cluster: Infrastructure and Protocol for Instant Grids
Given current complexity of Grid technologies, the lack of security of P2P systems and the rigidity of VPN technologies make sharing resources belonging to different institutions s...
Ala Rezmerita, Tangui Morlier, Vincent Néri...
IACR
2011
252views more  IACR 2011»
14 years 4 months ago
A Meet-in-the-Middle Attack on the Full KASUMI
KASUMI is a block cipher which consists eight Feistel rounds with a 128-bit key. The confidentiality and integrity of UMTS, GSM and GPRS mobile communications systems depend heavi...
Keting Jia, Hongbo Yu, Xiaoyun Wang
GECCO
2009
Springer
146views Optimization» more  GECCO 2009»
15 years 11 months ago
Analyzing the landscape of a graph based hyper-heuristic for timetabling problems
Hyper-heuristics can be thought of as “heuristics to choose heuristics”. They are concerned with adaptively finding solution methods, rather than directly producing a solutio...
Gabriela Ochoa, Rong Qu, Edmund K. Burke
MSR
2006
ACM
15 years 10 months ago
MAPO: mining API usages from open source repositories
To improve software productivity, when constructing new software systems, developers often reuse existing class libraries or frameworks by invoking their APIs. Those APIs, however...
Tao Xie, Jian Pei
SIGIR
2011
ACM
14 years 7 months ago
The economics in interactive information retrieval
Searching is inherently an interactive process usually requiring numerous iterations of querying and assessing in order to find the desired amount of relevant information. Essent...
Leif Azzopardi