Sciweavers

1079 search results - page 13 / 216
» An Implementation of an Address Generator Using Hash Memorie...
Sort
View
ITCC
2005
IEEE
14 years 2 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
CGO
2006
IEEE
14 years 21 days ago
Space-Efficient 64-bit Java Objects through Selective Typed Virtual Addressing
Memory performance is an important design issue for contemporary systems given the ever increasing memory gap. This paper proposes a space-efficient Java object model for reducing...
Kris Venstermans, Lieven Eeckhout, Koen De Bossche...
PKDD
2004
Springer
147views Data Mining» more  PKDD 2004»
14 years 2 months ago
Using a Hash-Based Method for Apriori-Based Graph Mining
The problem of discovering frequent subgraphs of graph data can be solved by constructing a candidate set of subgraphs first, and then, identifying within this candidate set those...
Phu Chien Nguyen, Takashi Washio, Kouzou Ohara, Hi...
ISCA
1993
IEEE
137views Hardware» more  ISCA 1993»
14 years 1 months ago
Architectural Support for Translation Table Management in Large Address Space Machines
Virtual memoy page translation tables provide mappings from virtual to physical addresses. When the hardware controlled Tratmlation L.ookaside Buffers (TLBs) do not contain a tran...
Jerome C. Huck, Jim Hays
INFOCOM
2002
IEEE
14 years 1 months ago
Efficient Hardware Architecture for Fast IP Address Lookup
 A multigigabit IP router may receive several millions packets per second from each input link. For each packet, the router needs to find the longest matching prefix in the forw...
Derek C. W. Pao, Angus Wu, Cutson Liu, Kwan Lawren...