Sciweavers

200 search results - page 35 / 40
» A combinatorial approach to the power of 2 in the number of ...
Sort
View
SOICT
2010
13 years 3 months ago
Password recovery for encrypted ZIP archives using GPUs
Protecting data by passwords in documents such as DOC, PDF or RAR, ZIP archives has been demonstrated to be weak under dictionary attacks. Time for recovering the passwords of suc...
Pham Hong Phong, Phan Duc Dung, Duong Nhat Tan, Ng...
ISESE
2006
IEEE
14 years 2 months ago
PBR vs. checklist: a replication in the n-fold inspection context
Inspection is considered a powerful method to check software documents for defects. Many published work shows that inspections in requirements specification phase are particularly...
Lulu He, Jeffrey C. Carver
DAC
2010
ACM
14 years 21 days ago
Off-chip memory bandwidth minimization through cache partitioning for multi-core platforms
We present a methodology for off-chip memory bandwidth minimization through application-driven L2 cache partitioning in multicore systems. A major challenge with multi-core system...
Chenjie Yu, Peter Petrov
ICDE
2010
IEEE
562views Database» more  ICDE 2010»
14 years 8 months ago
Multi-Guarded Safe Zone: An Effective Technique to Monitor Moving Circular Range Queries
Given a positive value r, a circular range query returns the objects that lie within the distance r of the query location. In this paper, we study the circular range queries that c...
Muhammad Aamir Cheema, Ljiljana Brankovic, Xuemin ...
BMCBI
2006
144views more  BMCBI 2006»
13 years 8 months ago
More robust detection of motifs in coexpressed genes by using phylogenetic information
Background: Several motif detection algorithms have been developed to discover overrepresented motifs in sets of coexpressed genes. However, in a noisy gene list, the number of ge...
Pieter Monsieurs, Gert Thijs, Abeer A. Fadda, Sigr...