Sciweavers

443 search results - page 26 / 89
» Relations in Concurrency
Sort
View
102
Voted
ITC
2003
IEEE
157views Hardware» more  ITC 2003»
15 years 7 months ago
Parity-Based Concurrent Error Detection in Symmetric Block Ciphers
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption. We will describe a general concurren...
Ramesh Karri, Grigori Kuznetsov, Michael Göss...
148
Voted
DAWAK
2005
Springer
15 years 3 months ago
Incremental Data Mining Using Concurrent Online Refresh of Materialized Data Mining Views
Abstract. Data mining is an iterative process. Users issue series of similar data mining queries, in each consecutive run slightly modifying either the definition of the mined dat...
Mikolaj Morzy, Tadeusz Morzy, Marek Wojciechowski,...
92
Voted
ICRA
2003
IEEE
119views Robotics» more  ICRA 2003»
15 years 7 months ago
Autonomous feature-based exploration
: The performance of single-camera SLAM is improved when wide-angle optics provide a field of view greater than the 40 to 50 degrees lenses normally used in computer vision. The is...
Paul M. Newman, Michael Bosse, John J. Leonard
147
Voted
ADC
2000
Springer
326views Database» more  ADC 2000»
15 years 6 months ago
T-Tree or B-Tree: Main Memory Database Index Structure Revisited
While the B-tree (or the B+ -tree) is the most popular index structure in disk-based relational database systems, the Ttree has been widely accepted as a promising index structure...
Hongjun Lu, Yuet Yeung Ng, Zengping Tian
169
Voted
FOCS
2003
IEEE
15 years 7 months ago
General Composition and Universal Composability in Secure Multi-Party Computation
Concurrent general composition relates to a setting where a secure protocol is run in a network concurrently with other, arbitrary protocols. Clearly, security in such a setting i...
Yehuda Lindell