Sciweavers

672 search results - page 66 / 135
» An assessment of tag presentation techniques
Sort
View
IPPS
1999
IEEE
14 years 2 days ago
Metrics for the Evaluation of Multicast Communications
In the distributed shipboard environment of interest to the United States Navy, there is an increasing interest in the use of multicast communications to reduce bandwidth consumpti...
Philip M. Irey IV, David T. Marlow
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
13 years 11 months ago
Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing
A series of recent papers have demonstrated collision attacks on popularly used hash functions, including the widely deployed MD5 and SHA-1 algorithm. To assess this threat, the na...
Michael Szydlo, Yiqun Lisa Yin
ECBS
2006
IEEE
153views Hardware» more  ECBS 2006»
13 years 11 months ago
A Unified Approach for Verification and Validation of Systems and Software Engineering Models
We present in this paper a unified paradigm for the verification and validation of software and systems engineering design models expressed in UML 2.0 or SysML. This paradigm reli...
Luay Alawneh, Mourad Debbabi, Yosr Jarraya, Andrei...
EWCBR
2006
Springer
13 years 11 months ago
Complexity Profiling for Informed Case-Base Editing
Abstract. The contents of the case knowledge container is critical to the performance of case-based classification systems. However the knowledge engineer is given little support i...
Stewart Massie, Susan Craw, Nirmalie Wiratunga
CORR
2008
Springer
134views Education» more  CORR 2008»
13 years 7 months ago
Algorithmic Based Fault Tolerance Applied to High Performance Computing
: We present a new approach to fault tolerance for High Performance Computing system. Our approach is based on a careful adaptation of the Algorithmic Based Fault Tolerance techniq...
George Bosilca, Remi Delmas, Jack Dongarra, Julien...