Sciweavers

6388 search results - page 1139 / 1278
» High Performance Data Mining
Sort
View
ISCA
1998
IEEE
144views Hardware» more  ISCA 1998»
15 years 9 months ago
Declustered Disk Array Architectures with Optimal and Near-Optimal Parallelism
This paper investigates the placement of data and parity on redundant disk arrays. Declustered organizations have been traditionally used to achieve fast reconstruction of a faile...
Guillermo A. Alvarez, Walter A. Burkhard, Larry J....
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 9 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
15 years 9 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
PADS
1996
ACM
15 years 9 months ago
Experiments in Automated Load Balancing
One of the promises of parallelized discrete-event simulation is that it might provide significant speedups over sequential simulation. In reality, high performance cannot be achi...
Linda F. Wilson, David M. Nicol
SIGSOFT
1996
ACM
15 years 9 months ago
Model Checking Large Software Specifications
In this paper we present our experiences in using symbolic model checking to analyze a specification of a software system for aircraft collision avoidance. Symbolic model checking ...
Richard J. Anderson, Paul Beame, Steve Burns, Will...
« Prev « First page 1139 / 1278 Last » Next »