Sciweavers

404 search results - page 39 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
162
Voted
JMLR
2008
148views more  JMLR 2008»
15 years 3 months ago
Linear-Time Computation of Similarity Measures for Sequential Data
Efficient and expressive comparison of sequences is an essential procedure for learning with sequential data. In this article we propose a generic framework for computation of sim...
Konrad Rieck, Pavel Laskov
119
Voted
JUCS
2008
143views more  JUCS 2008»
15 years 3 months ago
Consequence of Two-handed Manipulation on Speed, Precision and Perception on Spatial Input Task in 3D Modelling Applications
Abstract: We developed a free form deformation application for an immersive environment in which users can interact freely using data gloves. To ensure better comfort and performan...
Manuel Veit, Antonio Capobianco, Dominique Bechman...
114
Voted
PPOPP
1997
ACM
15 years 7 months ago
The Interaction of Parallel Programming Constructs and Coherence Protocols
Some of the most common parallel programming idioms include locks, barriers, and reduction operations. The interaction of these programming idioms with the multiprocessor's c...
Ricardo Bianchini, Enrique V. Carrera, Leonidas I....
138
Voted
SISW
2003
IEEE
15 years 8 months ago
Cryptographic File Systems Performance: What You Don't Know Can Hurt You
Securing data is more important than ever, yet cryptographic file systems still have not received wide use. One barrier to the adoption of cryptographic file systems is that the...
Charles P. Wright, Jay Dave, Erez Zadok
129
Voted
CHES
2003
Springer
106views Cryptology» more  CHES 2003»
15 years 8 months ago
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves
For most of the time since they were proposed, it was widely believed that hyperelliptic curve cryptosystems (HECC) carry a substantial performance penalty compared to elliptic cur...
Jan Pelzl, Thomas J. Wollinger, Jorge Guajardo, Ch...