Sciweavers

757 search results - page 126 / 152
» Composing Security-Aware Software
Sort
View
CHES
2010
Springer
189views Cryptology» more  CHES 2010»
14 years 11 months ago
Quark: A Lightweight Hash
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by application designers, notably for implementing RFI...
Jean-Philippe Aumasson, Luca Henzen, Willi Meier, ...
CIDR
2009
126views Algorithms» more  CIDR 2009»
14 years 11 months ago
Declarative Reconfigurable Trust Management
In recent years, there has been a proliferation of declarative logic-based trust management languages and systems proposed to ease the description, configuration, and enforcement ...
William R. Marczak, David Zook, Wenchao Zhou, Molh...
CLEF
2009
Springer
14 years 11 months ago
Approaching Question Answering by Means of Paragraph Validation
In this paper we describe the system we developed for taking part in monolingual Spanish and English tasks at ResPubliQA 2009. Our system was composed by an IR phase focused on im...
Álvaro Rodrigo, Joaquín Pérez...
EUROPAR
2010
Springer
14 years 11 months ago
Profile-Driven Selective Program Loading
Abstract. Complex software systems use many shared libraries frequently composed of large off-the-shelf components. Only a limited number of functions are used from these shared li...
Tugrul Ince, Jeffrey K. Hollingsworth
AINA
2010
IEEE
14 years 10 months ago
Schedule Distributed Virtual Machines in a Service Oriented Environment
—Virtual machines offer unique advantages to the scientific computing community, such as Quality of Service(QoS) guarantee, performance isolation, easy resource management, and ...
Lizhe Wang, Gregor von Laszewski, Marcel Kunze, Ji...