Sciweavers

8031 search results - page 1378 / 1607
» Knowledge and Workflow Systems
Sort
View
CIKM
2006
Springer
15 years 2 months ago
Cache-oblivious nested-loop joins
We propose to adapt the newly emerged cache-oblivious model to relational query processing. Our goal is to automatically achieve an overall performance comparable to that of fine-...
Bingsheng He, Qiong Luo
FLOPS
2004
Springer
15 years 2 months ago
Analysing Definitional Trees: Looking for Determinism
Abstract. This paper describes how high level implementations of (needed) narrowing into Prolog can be improved by analysing definitional trees. First, we introduce a refined repre...
Pascual Julián Iranzo, Christian Villamizar...
FTDCS
2004
IEEE
15 years 2 months ago
A New Perspective in Defending against DDoS
Distributed denial of service (DDoS) is a major threat to the availability of Internet services. The anonymity allowed by IP networking, together with the distributed, large scale...
Shigang Chen, Randy Chow
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 2 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
86
Voted
DAGM
2006
Springer
15 years 2 months ago
Nonparametric Density Estimation for Human Pose Tracking
The present paper considers the supplement of prior knowledge about joint angle configurations in the scope of 3-D human pose tracking. Training samples obtained from an industrial...
Thomas Brox, Bodo Rosenhahn, Uwe G. Kersting, Dani...
« Prev « First page 1378 / 1607 Last » Next »