Sciweavers

668 search results - page 62 / 134
» Openness in Higher Education: Open Source, Open Standards, O...
Sort
View
HPDC
2008
IEEE
15 years 21 days ago
Code coverage, performance approximation and automatic recognition of idioms in scientific applications
Basic data flow patterns which we call idioms, such as stream, transpose, reduction, random access and stencil, are common in scientific numerical applications. We hypothesize tha...
Jiahua He, Allan Snavely, Rob F. Van der Wijngaart...
111
Voted
JNCA
2007
75views more  JNCA 2007»
15 years 13 days ago
Stateful DDoS attacks and targeted filtering
The goal of a DDoS (distributed denial of service) attack is to completely tie up certain resources so that legitimate users are not able to access a service. It has long been an ...
Shigang Chen, Yong Tang, Wenliang Du
117
Voted
CORR
2011
Springer
186views Education» more  CORR 2011»
14 years 7 months ago
Key Reduction of McEliece's Cryptosystem Using List Decoding
Different variants of the code-based McEliece cryptosystem were proposed to reduce the size of the public key. All these variants use very structured codes, which open the door t...
Morgan Barbier
91
Voted
AIM
2005
15 years 14 days ago
RoboCup 2004 Competitions and Symposium: A Small Kick for Robots, a Giant Score for Science
RoboCup is an international initiative with the main goals of fostering research and education in Artificial Intelligence and Robotics, as well as of promoting science and technol...
Pedro U. Lima, Luís M. M. Custódio, ...
FAST
2010
15 years 2 months ago
Panache: A Parallel File System Cache for Global File Access
Cloud computing promises large-scale and seamless access to vast quantities of data across the globe. Applications will demand the reliability, consistency, and performance of a t...
Marc Eshel, Roger L. Haskin, Dean Hildebrand, Mano...