Sciweavers

20175 search results - page 124 / 4035
» Is abstraction the key to computing
Sort
View
98
Voted
PDPTA
2010
14 years 10 months ago
Raising the Level of Abstraction of GPU-programming
Ferosh Jacob, Ritu Arora, Purushotham Bangalore, M...
117
Voted
DSOM
2009
Springer
15 years 7 months ago
One Is Not Enough: A Hybrid Approach for IT Change Planning
Abstract. We propose a novel hybrid planning approach for the automated generation of IT change plans. The algorithm addresses an abstraction mismatch between refinement of tasks ...
Sebastian Hagen, Nigel Edwards, Lawrence Wilcock, ...
113
Voted
ASIACRYPT
2003
Springer
15 years 4 months ago
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
We propose a new public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Our scheme is more efficient than the DF scheme suggested by Y. Dodis and N. F...
Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
ISMIR
2004
Springer
115views Music» more  ISMIR 2004»
15 years 6 months ago
Musical key extraction from audio
The realisation and evaluation of a musical key extraction algorithm that works directly on raw audio data is presented. Its implementation is based on models of human auditory pe...
Steffen Pauws
IDTRUST
2009
ACM
15 years 7 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper