Sciweavers

6906 search results - page 1142 / 1382
» An algorithm for modelling key terms
Sort
View
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
15 years 10 months ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...
CLOUD
2010
ACM
15 years 9 months ago
A self-organized, fault-tolerant and scalable replication scheme for cloud storage
Failures of any type are common in current datacenters, partly due to the higher scales of the data stored. As data scales up, its availability becomes more complex, while differe...
Nicolas Bonvin, Thanasis G. Papaioannou, Karl Aber...
ICWE
2010
Springer
15 years 9 months ago
Interfaces for Scripting: Making Greasemonkey Scripts Resilient to Website Upgrades
Thousands of users are streamlining their Web interactions through user scripts using special weavers such as Greasemonkey. Thousands of programmers are releasing their scripts in ...
Oscar Díaz, Cristóbal Arellano, Jon ...
SIGMETRICS
2000
ACM
177views Hardware» more  SIGMETRICS 2000»
15 years 9 months ago
A case for end system multicast
— The conventional wisdom has been that IP is the natural protocol layer for implementing multicast related functionality. However, more than a decade after its initial proposal,...
Yang-Hua Chu, Sanjay G. Rao, Hui Zhang
IWANN
1997
Springer
15 years 8 months ago
The Pattern Extraction Architecture: A Connectionist Alternative to the Von Neumann Architecture
A detailed connectionist architecture is described which is capable of relating psychological behavior to the functioning of neurons and neurochemicals. The need to be able to bui...
L. Andrew Coward
« Prev « First page 1142 / 1382 Last » Next »