Sciweavers

3190 search results - page 555 / 638
» cans 2011
Sort
View
137
Voted
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
14 years 13 days ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
116
Voted
DAC
2011
ACM
14 years 13 days ago
Understanding the impact of power loss on flash memory
Flash memory is quickly becoming a common component in computer systems ranging from music players to mission-critical server systems. As flash plays a more important role, data ...
Hung-Wei Tseng, Laura M. Grupp, Steven Swanson
DCOSS
2011
Springer
14 years 13 days ago
On sensor selection in linked information networks
—Sensor networks are often redundant by design; this is often done in order to achieve reliability in information processing. In many cases, the redundancy relationships between ...
Charu C. Aggarwal, Amotz Bar-Noy, Simon Shamoun
232
Voted
DNA
2011
Springer
227views Bioinformatics» more  DNA 2011»
14 years 12 days ago
Cooperative Assembly Systems
Several molecular systems form large-scale objects. One would like to understand their assembly and how this assembly is regulated. As a first step, we investigate the phase trans...
Vincent Danos, Heinz Koeppl, John Wilson-Kanamori
182
Voted
ECOOP
2011
Springer
14 years 12 days ago
Frequency Estimation of Virtual Call Targets for Object-Oriented Programs
Abstract. The information of execution frequencies of virtual call targets is valuable for program analyses and optimizations of object-oriented programs. However, to obtain this i...
Cheng Zhang, Hao Xu, Sai Zhang, Jianjun Zhao, Yuti...