Sciweavers

2978 search results - page 98 / 596
» Operations Research
Sort
View
USS
2008
15 years 5 months ago
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications
We examine the security requirements for creating a Deniable File System (DFS), and the efficacy with which the TrueCrypt disk-encryption software meets those requirements. We fin...
Alexei Czeskis, David J. St. Hilaire, Karl Koscher...
ENTCS
2006
121views more  ENTCS 2006»
15 years 3 months ago
A Hierarchy of SOS Rule Formats
nary abstract) Jan Friso Groote 1 MohammadReza Mousavi 2 Michel A. Reniers 3 Department of Computer Science, Eindhoven University of Technology (TU/e), P.O. Box 513, NL-5600 MB Ein...
Jan Friso Groote, Mohammad Reza Mousavi, Michel A....
WSC
2008
15 years 5 months ago
Allocating outpatient clinic services using simulation and linear programming
A large number of operational tools exist to help researchers determine business solutions for their customers. Each individual tool serves a distinct purpose for specific types o...
Martin J. Miller, David M. Ferrin, Niloo Shahi, Ri...
HOTOS
1997
IEEE
15 years 7 months ago
The Flux OS Toolkit: Reusable Components for OS Implementation
To an unappreciated degree, research both in operating systems andtheirprogramminglanguageshasbeen severely hampered by the lack of cleanly reusable code providing mundanelow-leve...
Bryan Ford, Kevin Van Maren, Jay Lepreau, Stephen ...
ARITH
2007
IEEE
15 years 7 months ago
Return of the hardware floating-point elementary function
The study of specific hardware circuits for the evaluation of floating-point elementary functions was once an active research area, until it was realized that these functions were...
Jérémie Detrey, Florent de Dinechin,...