Sciweavers

860 search results - page 165 / 172
» Completeness in two-party secure computation: a computationa...
Sort
View
EDBT
2008
ACM
161views Database» more  EDBT 2008»
15 years 10 months ago
Load distribution of analytical query workloads for database cluster architectures
Enterprises may have multiple database systems spread across the organization for redundancy or for serving different applications. In such systems, query workloads can be distrib...
Thomas Phan, Wen-Syan Li
ICDE
2009
IEEE
133views Database» more  ICDE 2009»
15 years 4 months ago
STAR: Steiner-Tree Approximation in Relationship Graphs
— Large graphs and networks are abundant in modern information systems: entity-relationship graphs over relational data or Web-extracted entities, biological networks, social onl...
Gjergji Kasneci, Maya Ramanath, Mauro Sozio, Fabia...
PERCOM
2009
ACM
15 years 4 months ago
An Empirical Analysis of Wi-Fi Activity in Three Urban Scenarios
—A better understanding of people’s daily behaviors with respect to the underlying wireless network is a crucial step toward Wi-Fi based pervasive networking. Existing analyses...
Thomas Claveirole, Mathias Boc, Marcelo Dias de Am...
AFRICACRYPT
2009
Springer
15 years 4 months ago
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the efforts required for a complete break of remote keyless...
Markus Kasper, Timo Kasper, Amir Moradi, Christof ...
ELPUB
2006
ACM
15 years 3 months ago
Modelling a Layer for Real-Time Management of Interactions in Web Based Distance Learning
In the last few years, the University of Aveiro, Portugal, has been offering several distance learning courses over the Web, using e-learning platforms. Experience showed that dif...
Carlos Sousa Pinto, Fernando M. S. Ramos