Sciweavers

3305 search results - page 550 / 661
» Can we Rely on SQL
Sort
View
JUCS
2008
113views more  JUCS 2008»
13 years 10 months ago
Enhancing ZRTP by using Computational Puzzles
Abstract: In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations. The first innovation is the integration of...
Helmut Hlavacs, Wilfried N. Gansterer, Hannes Scha...
MICRO
2008
IEEE
146views Hardware» more  MICRO 2008»
13 years 10 months ago
A small cache of large ranges: Hardware methods for efficiently searching, storing, and updating big dataflow tags
Dynamically tracking the flow of data within a microprocessor creates many new opportunities to detect and track malicious or erroneous behavior, but these schemes all rely on the...
Mohit Tiwari, Banit Agrawal, Shashidhar Mysore, Jo...
BMCBI
2005
98views more  BMCBI 2005»
13 years 10 months ago
InterferenceAnalyzer: Tools for the analysis and simulation of multi-locus genetic data
Background: Good statistical models for analyzing and simulating multilocus recombination data exist but are not accessible to many biologists because their use requires reasonabl...
Lalitha Viswanath, Elizabeth A. Housworth
COGSCI
2004
81views more  COGSCI 2004»
13 years 10 months ago
Soft constraints in interactive behavior: the case of ignoring perfect knowledge in-the-world for imperfect knowledge in-the-hea
Constraints and dependencies among the elements of embodied cognition form patterns or microstrategies of interactive behavior. Hard constraints determine which microstrategies ar...
Wayne D. Gray, Wai-Tat Fu
CCR
2000
96views more  CCR 2000»
13 years 10 months ago
Decentralized optimal traffic engineering in the internet
Distributed optimal traffic engineering in the presence of multiple paths has been found to be a difficult problem to solve. In this paper, we introduce a new approach in an attem...
Constantino M. Lagoa, Hao Che