Sciweavers

6329 search results - page 1147 / 1266
» Detection of Stochastic Processes
Sort
View
ATAL
2008
Springer
15 years 7 months ago
Extending virtual organizations to improve trust mechanisms
Virtual Organizations (VOs) are becoming an increasingly important research topic in the field of Multi-Agent Systems (MAS). The problem of selecting suitable counterparts to inte...
Ramón Hermoso, Roberto Centeno, Holger Bill...
124
Voted
CCS
2008
ACM
15 years 7 months ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis
CHES
2008
Springer
144views Cryptology» more  CHES 2008»
15 years 7 months ago
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
Abstract. This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate...
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Ak...
158
Voted
DAMON
2006
Springer
15 years 7 months ago
B-tree indexes, interpolation search, and skew
Recent performance improvements in storage hardware have benefited bandwidth much more than latency. Among other implications, this trend favors large B-tree pages. Recent perform...
Goetz Graefe
146
Voted
DMSN
2005
ACM
15 years 7 months ago
Zone sharing: a hot-spots decomposition scheme for data-centric storage in sensor networks
In the resource over-constrained environment of sensor networks, techniques for storing data locally in sensor nodes have been proposed to support efficient processing of adhoc qu...
Mohamed Aly, Nicholas Morsillo, Panos K. Chrysanth...
« Prev « First page 1147 / 1266 Last » Next »