Sciweavers

679 search results - page 130 / 136
» Using decision problems in public key cryptography
Sort
View
CONCUR
2011
Springer
13 years 11 months ago
Reasoning about Threads with Bounded Lock Chains
The problem of model checking threads interacting purely via the standard synchronization primitives is key for many concurrent program analyses, particularly dataflow analysis. U...
Vineet Kahlon
KDD
2010
ACM
199views Data Mining» more  KDD 2010»
15 years 3 months ago
Overlapping experiment infrastructure: more, better, faster experimentation
At Google, experimentation is practically a mantra; we evaluate almost every change that potentially affects what our users experience. Such changes include not only obvious user-...
Diane Tang, Ashish Agarwal, Deirdre O'Brien, Mike ...
104
Voted
CGO
2004
IEEE
15 years 3 months ago
A Dynamically Tuned Sorting Library
Empirical search is a strategy used during the installation of library generators such as ATLAS, FFTW, and SPIRAL to identify the algorithm or the version of an algorithm that del...
Xiaoming Li, María Jesús Garzar&aacu...
FC
2006
Springer
129views Cryptology» more  FC 2006»
15 years 3 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig
81
Voted
HICSS
2003
IEEE
100views Biometrics» more  HICSS 2003»
15 years 4 months ago
Increase of Potential Intellectual Bandwidth in a Scientific Community through Implementation of an End-User Information System
Qureshi, et al. (2002) [1] presented a case study where they used a framework, the Intellectual Bandwidth Model to measure an organization’s ability to create value. The model c...
Christian Bach, Salvatore Belardo, Jing Zhang