Sciweavers

12836 search results - page 2424 / 2568
» Generalization Methods in Bioinformatics
Sort
View
142
Voted
PLDI
2004
ACM
15 years 9 months ago
KISS: keep it simple and sequential
The design of concurrent programs is error-prone due to the interaction between concurrently executing threads. Traditional automated techniques for finding errors in concurrent ...
Shaz Qadeer, Dinghao Wu
SIGCOMM
2004
ACM
15 years 9 months ago
A wavelet-based approach to detect shared congestion
Per-flow congestion control helps endpoints fairly and efficiently share network resources. Better utilization of network resources can be achieved, however, if congestion manag...
Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S....
131
Voted
SIGIR
2004
ACM
15 years 9 months ago
Web-page classification through summarization
Web-page classification is much more difficult than pure-text classification due to a large variety of noisy information embedded in Web pages. In this paper, we propose a new Web...
Dou Shen, Zheng Chen, Qiang Yang, Hua-Jun Zeng, Be...
184
Voted
SIGMETRICS
2004
ACM
206views Hardware» more  SIGMETRICS 2004»
15 years 9 months ago
Performance aware tasking for environmentally powered sensor networks
The use of environmental energy is now emerging as a feasible energy source for embedded and wireless computing systems such as sensor networks where manual recharging or replacem...
Aman Kansal, Dunny Potter, Mani B. Srivastava
110
Voted
CRYPTO
2004
Springer
112views Cryptology» more  CRYPTO 2004»
15 years 9 months ago
Feistel Schemes and Bi-linear Cryptanalysis
Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased character...
Nicolas Courtois
« Prev « First page 2424 / 2568 Last » Next »