Sciweavers

1166 search results - page 189 / 234
» Adaptively Secure Broadcast
Sort
View
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
14 years 2 months ago
Collisions and Near-Collisions for Reduced-Round Tiger
We describe a collision-finding attack on 16 rounds of the Tiger hash function requiring the time for about 244 compression function invocations. Another attack generates pseudo-ne...
John Kelsey, Stefan Lucks
TSDM
2000
151views Data Mining» more  TSDM 2000»
14 years 2 months ago
Identifying Temporal Patterns for Characterization and Prediction of Financial Time Series Events
The novel Time Series Data Mining (TSDM) framework is applied to analyzing financial time series. The TSDM framework adapts and innovates data mining concepts to analyzing time ser...
Richard J. Povinelli
EUROPAR
2007
Springer
14 years 24 days ago
Evaluation of a Utility Computing Model Based on the Federation of Grid Infrastructures
Utility computing is a service provisioning model which will provide adaptive, flexible and simple access to computing resources, enabling a pay-per-use model for computing simila...
Constantino Vázquez, Eduardo Huedo, Rub&eac...
IC
2001
14 years 11 days ago
The WebShop E-Commerce Framework
- This paper presents an e-commerce framework called WebShop, which was developed by the authors for the purpose of demonstrating the use of UML and the UML-F in the domain of Web ...
Marcus Fontoura, Wolfgang Pree, Bernhard Rumpe
OSDI
2000
ACM
14 years 10 days ago
End-to-End Authorization
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified app...
Jon Howell, David Kotz