Sciweavers

486 search results - page 53 / 98
» policy 2005
Sort
View
EUROCRYPT
2005
Springer
15 years 3 months ago
Related-Key Boomerang and Rectangle Attacks
This paper introduces the related-key boomerang and the related-key rectangle attacks. These new attacks can expand the cryptanalytic toolbox, and can be applied to many block ciph...
Eli Biham, Orr Dunkelman, Nathan Keller
ICDE
2005
IEEE
109views Database» more  ICDE 2005»
15 years 3 months ago
Advanced Metadata for Privacy-Aware Representation of Credentials
Semantic Web languages like OWL and RDFS promise to be viable means for representing metadata describing users and resources available over the Internet. Recently, interest has be...
Paolo Ceravolo, Ernesto Damiani, Sabrina De Capita...
80
Voted
IAT
2005
IEEE
15 years 3 months ago
Analyzing Myopic Approaches for Multi-Agent Communication
Choosing when to communicate is a fundamental problem in multi-agent systems. This problem becomes particularly hard when communication is constrained and each agent has different...
Raphen Becker, Victor R. Lesser, Shlomo Zilberstei...
ISLPED
2005
ACM
111views Hardware» more  ISLPED 2005»
15 years 3 months ago
Energy reduction in multiprocessor systems using transactional memory
The emphasis in microprocessor design has shifted from high performance, to a combination of high performance and low power. Until recently, this trend was mostly true for uniproc...
Tali Moreshet, R. Iris Bahar, Maurice Herlihy
CITA
2005
IEEE
15 years 3 months ago
Cache Hierarchy Inspired Compression: a Novel Architecture for Data Streams
- We present an architecture for data streams based on structures typically found in web cache hierarchies. The main idea is to build a meta level analyser from a number of levels ...
Geoffrey Holmes, Bernhard Pfahringer, Richard Kirk...