Sciweavers

1566 search results - page 82 / 314
» Contification Using Dominators
Sort
View
125
Voted
WSC
2004
15 years 3 months ago
A BGP Attack Against Traffic Engineering
As the Internet grows, traffic engineering has become a widely-used technique to control the flow of packets. For the inter-domain routing, traffic engineering relies on configura...
Jintae Kim, Steven Y. Ko, David M. Nicol, Xenofont...
138
Voted
ISMB
1994
15 years 3 months ago
Genetic Map Construction with Constraints
Apilot program,CME,is describedfor generatinga physical genetic mapfromhybridization fingerprintingdata. CMEis implementedin the parallel constraint logic programming language Eli...
Dominic A. Clark, Christopher J. Rawlings, Sylvie ...
119
Voted
GRC
2008
IEEE
15 years 3 months ago
Fuzzy Preference Relation Rough Sets
Preference analysis is a class of important tasks in multi-criteria decision making. The classical rough set theory was generalized to deal with preference analysis by replacing e...
Qinghua Hu, Daren Yu, Congxin Wu
105
Voted
CGF
2008
83views more  CGF 2008»
15 years 2 months ago
Shallow Bounding Volume Hierarchies for Fast SIMD Ray Tracing of Incoherent Rays
Photorealistic image synthesis is a computationally demanding task that relies on ray tracing for the evaluation of integrals. Rendering time is dominated by tracing long paths th...
Holger Dammertz, Johannes Hanika, Alexander Keller
CORR
2006
Springer
182views Education» more  CORR 2006»
15 years 2 months ago
Cryptanalysis of the CFVZ cryptosystem
The paper analyzes CFVZ, a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the co...
Joan-Josep Climent, E. Gorla, J. Rosenthal