Sciweavers

3379 search results - page 635 / 676
» Powers of Two
Sort
View
102
Voted
CEC
2010
IEEE
15 years 20 hour ago
Beyond No Free Lunch: Realistic algorithms for arbitrary problem classes
In this paper we present a simple and general new No Free Lunch-like result that applies to revisiting algorithms searching arbitrary problem sets. We begin by unifying the assumpt...
James A. R. Marshall, Thomas G. Hinton
102
Voted
CHES
2010
Springer
187views Cryptology» more  CHES 2010»
15 years 19 hour ago
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain...
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Re...
91
Voted
CSL
2010
Springer
15 years 16 hour ago
Embedding Deduction Modulo into a Prover
Deduction modulo consists in presenting a theory through rewrite rules to support automatic and interactive proof search. It induces proof search methods based on narrowing, such a...
Guillaume Burel
CONEXT
2009
ACM
15 years 10 hour ago
Exploiting dynamicity in graph-based traffic analysis: techniques and applications
Network traffic can be represented by a Traffic Dispersion Graph (TDG) that contains an edge between two nodes that send a particular type of traffic (e.g., DNS) to one another. T...
Marios Iliofotou, Michalis Faloutsos, Michael Mitz...
86
Voted
FAST
2010
15 years 9 hour ago
DFS: A File System for Virtualized Flash Storage
This paper presents the design, implementation and evaluation of Direct File System (DFS) for virtualized flash storage. of using traditional layers of abstraction, our layers of ...
William K. Josephson, Lars Ailo Bongo, David Flynn...