Sciweavers

1713 search results - page 312 / 343
» Analysis of Procedure Splitability
Sort
View
INFOCOM
2006
IEEE
14 years 2 months ago
The Index Poisoning Attack in P2P File Sharing Systems
— P2P file-sharing systems have indexes, which users search to find locations of desired titles. In the index poisoning attack, the attacker inserts massive numbers of bogus re...
Jian Liang, Naoum Naoumov, Keith W. Ross
IPPS
2006
IEEE
14 years 2 months ago
Parallel calculation of volcanoes for cryptographic uses
Elliptic curve cryptosystems are nowadays widely used in the design of many security devices. Nevertheless, since not every elliptic curve is useful for cryptographic purposes, me...
Santi Martínez, R. Tomas, C. Roig, Magda Va...
30
Voted
IPPS
2006
IEEE
14 years 2 months ago
Accelerating DTI tractography using FPGAs
Diffusion Tensor Imaging (DTI) tractography in Magnetic Resonance Imaging (MRI) is a computationally intensive procedure, requiring on the order of tens of minutes to complete tr...
Kwatra Kwatra, Viktor K. Prasanna, Mitali Singh
ISBI
2006
IEEE
14 years 2 months ago
x-f SENSE: optimal spatio-temporal sensitivity encoding for dynamic MR imaging
For high quality MR imaging of time-varying objects such as beating heart or brain hemodynamics, we need to reduce signal acquisition time without sacrificing the spatial resolut...
Jinhee Kim, Jong Chul Ye, Jaehung Yoo
QEST
2006
IEEE
14 years 2 months ago
Safe On-The-Fly Steady-State Detection for Time-Bounded Reachability
The time-bounded reachability problem for continuoustime Markov chains (CTMCs) amounts to determine the probability to reach a (set of) goal state(s) within a given time span, suc...
Joost-Pieter Katoen, Ivan S. Zapreev