Sciweavers

9186 search results - page 1760 / 1838
» A Module System for Scheme
Sort
View
LCPC
2009
Springer
14 years 1 months ago
Speculative Optimizations for Parallel Programs on Multicores
The advent of multicores presents a promising opportunity for exploiting fine grained parallelism present in programs. Programs parallelized in the above fashion, typically involv...
Vijay Nagarajan, Rajiv Gupta
WILF
2009
Springer
196views Fuzzy Logic» more  WILF 2009»
14 years 1 months ago
Interactive Image Retrieval in a Fuzzy Framework
In this paper, an interactive image retrieval scheme using MPEG-7 visual descriptors is proposed. The performance of image retrieval systems is still limited due to semantic gap, w...
Malay Kumar Kundu, Minakshi Banerjee, Priyank Bagr...
IWDC
2001
Springer
145views Communications» more  IWDC 2001»
14 years 1 months ago
Activating and Deactivating Repair Servers in Active Multicast Trees
Abstract. For time-constrained applications, repair-server-based active local recovery approaches can be valuable in providing low-latency reliable multicast service. However, an a...
Ping Ji, James F. Kurose, Donald F. Towsley
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
14 years 1 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
14 years 1 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
« Prev « First page 1760 / 1838 Last » Next »