Sciweavers

480 search results - page 18 / 96
» A practical bottleneck detection method
Sort
View
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
12 years 14 days ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
WAIM
2009
Springer
14 years 2 months ago
Intervention Events Detection and Prediction in Data Streams
Abstract. Mining interesting patterns in data streams has attracted special attention recently. This study revealed the principles behind observations, through variation of interve...
Yue Wang, Changjie Tang, Chuan Li, Yu Chen, Ning Y...
COMPSAC
1999
IEEE
14 years 2 months ago
Detecting Null Pointer Violations in Java Programs
The use of formal methods has been growing steadily and there have been a number of successful applications of formal methods in a range of application areas. It seems agreed that...
Xiaoping Jia, Sushant Sawant, Jiangyu Zhou, Sotiri...
AIIDE
2008
14 years 12 days ago
An Intelligent IDE for Behavior Authoring in Real-Time Strategy Games
Behavior authoring for computer games involves writing behaviors in a programming language and then iteratively refining them by detecting issues with them. The main bottlenecks a...
Suhas Virmani, Yatin Kanetkar, Manish Mehta, Santi...
CIC
2003
150views Communications» more  CIC 2003»
13 years 11 months ago
Performance Modeling of a Cluster of Workstations
Using off-the-shelf commodity workstations to build a cluster for parallel computing has become a common practice. In studying or designing a cluster of workstations one should ha...
Ahmed M. Mohamed, Lester Lipsky, Reda A. Ammar