Sciweavers

1010 search results - page 198 / 202
» Designing Then and Now
Sort
View
SACMAT
2010
ACM
14 years 9 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
93
Voted
ASIACRYPT
2010
Springer
14 years 9 months ago
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SH...
Jian Guo, San Ling, Christian Rechberger, Huaxiong...
108
Voted
CASCON
2010
174views Education» more  CASCON 2010»
14 years 9 months ago
Smart Services Across the Real and Virtual Worlds
Today, we are witnessing a new level of scale, complexity, and pervasiveness of software systems that are designed to support much more holistically complex processes. Much richer...
Eleni Stroulia
81
Voted
IPPS
2010
IEEE
14 years 8 months ago
Profitability-based power allocation for speculative multithreaded systems
With the shrinking of transistors continuing to follow Moore's Law and the non-scalability of conventional outof-order processors, multi-core systems are becoming the design ...
Polychronis Xekalakis, Nikolas Ioannou, Salman Kha...
128
Voted
RTAS
2010
IEEE
14 years 8 months ago
Using PCM in Next-generation Embedded Space Applications
Abstract--Dynamic RAM (DRAM) has been the best technology for main memory for over thirty years. In embedded space applications, radiation hardened DRAM is needed because gamma ray...
Alexandre Peixoto Ferreira, Bruce R. Childers, Ram...