Sciweavers

6404 search results - page 1201 / 1281
» Blocks
Sort
View
FSE
1994
Springer
134views Cryptology» more  FSE 1994»
13 years 12 months ago
Cryptanalysis of McGuffin
This paper shows that the actual proposal for an unbalanced Feistel network by Schneier and Blaze is as vulnerable to differential cryptanalysis as the DES. 1 McGuffin Schneier and...
Vincent Rijmen, Bart Preneel
ASPLOS
1992
ACM
13 years 12 months ago
Non-Volatile Memory for Fast, Reliable File Systems
Given the decreasing cost of non-volatile RAM (NVRAM), by the late 1990's it will be feasible for most workstations to include a megabyte or more of NVRAM, enabling the desig...
Mary Baker, Satoshi Asami, Etienne Deprit, John K....
ASPLOS
1992
ACM
13 years 12 months ago
Parity Declustering for Continuous Operation in Redundant Disk Arrays
We describe and evaluate a strategy for declustering the parity encoding in a redundant disk array. This declustered parity organization balances cost against data reliability and...
Mark Holland, Garth A. Gibson
SMA
1993
ACM
124views Solid Modeling» more  SMA 1993»
13 years 12 months ago
Intelligent form feature interaction management in a cellular modeling scheme
Form features present a rather attractive building block in computer-aided design environments for a variety of applications, providing the embodiment of engineering semantics in ...
Rafael Bidarra, José Carlos Teixeira
SPAA
1993
ACM
13 years 12 months ago
Asymptotically Tight Bounds for Performing BMMC Permutations on Parallel Disk Systems
d Abstract) Thomas H. Cormen Leonard F. Wisniewski Department of Mathematics and Computer Science Dartmouth College We give asymptotically equal lower and upper bounds for the num...
Thomas H. Cormen, Leonard F. Wisniewski
« Prev « First page 1201 / 1281 Last » Next »