Sciweavers

9511 search results - page 1898 / 1903
» Selected Design Issues
Sort
View
IACR
2011
106views more  IACR 2011»
14 years 2 days ago
Hash Functions Based on Three Permutations: A Generic Security Analysis
We consider the family of 2n-to-n-bit compression functions that are solely based on at most three permutation executions and on XOR-operators, and analyze its collision and preima...
Bart Mennink, Bart Preneel
ASPLOS
2012
ACM
13 years 8 months ago
DejaVu: accelerating resource allocation in virtualized environments
Effective resource management of virtualized environments is a challenging task. State-of-the-art management systems either rely on analytical models or evaluate resource allocati...
Nedeljko Vasic, Dejan M. Novakovic, Svetozar Miuci...
123
Voted
IHI
2012
197views Healthcare» more  IHI 2012»
13 years 8 months ago
A corpus of clinical narratives annotated with temporal information
Clinical reports often include descriptions of events in the patient’s medical history, as well as explicit or implicit temporal information about these events. We are working t...
Lucian Galescu, Nate Blaylock
155
Voted
IHI
2012
287views Healthcare» more  IHI 2012»
13 years 8 months ago
MARHS: mobility assessment system with remote healthcare functionality for movement disorders
Due to the global trend of aging societies with increasing demand for low cost and high quality healthcare services, there has been extensive research and development directed tow...
Sunghoon Ivan Lee, Jonathan Woodbridge, Ani Nahape...
119
Voted
POPL
2012
ACM
13 years 8 months ago
Access permission contracts for scripting languages
The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to s...
Phillip Heidegger, Annette Bieniusa, Peter Thieman...
« Prev « First page 1898 / 1903 Last » Next »