Sciweavers

18451 search results - page 3666 / 3691
» Selecting a Selection Procedure
Sort
View
ACSAC
2010
IEEE
14 years 1 months ago
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
Baris Coskun, Sven Dietrich, Nasir D. Memon
APSEC
2010
IEEE
14 years 1 months ago
Evaluating Cloud Platform Architecture with the CARE Framework
There is an emergence of cloud application platforms such as Microsoft’s Azure, Google’s App Engine and Amazon’s EC2/SimpleDB/S3. Startups and Enterprise alike, lured by the...
Liang Zhao, Anna Liu, Jacky Keung
121
Voted
ACNS
2011
Springer
254views Cryptology» more  ACNS 2011»
14 years 1 months ago
Linear Analysis of Reduced-Round CubeHash
Abstract. Recent developments in the field of cryptanalysis of hash functions has inspired NIST to announce a competition for selecting a new cryptographic hash function to join t...
Tomer Ashur, Orr Dunkelman
AFRICACRYPT
2011
Springer
14 years 1 months ago
Really Fast Syndrome-Based Hashing
Abstract. The FSB (fast syndrome-based) hash function was submitted to the SHA-3 competition by Augot, Finiasz, Gaborit, Manuel, and Sendrier in 2008, after preliminary designs pro...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...
101
Voted
ALGORITHMICA
2011
14 years 1 months ago
Algorithms for Marketing-Mix Optimization
Algorithms for determining quality/cost/price tradeoffs in saturated markets are consid-3 ered. A product is modeled by d real-valued qualities whose sum determines the unit cost ...
Joachim Gudmundsson, Pat Morin, Michiel H. M. Smid
« Prev « First page 3666 / 3691 Last » Next »