Sciweavers

5122 search results - page 1007 / 1025
» Comparing Consequence Relations
Sort
View
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
13 years 5 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
SIGSOFT
2010
ACM
13 years 5 months ago
The missing links: bugs and bug-fix commits
Empirical studies of software defects rely on links between bug databases and program code repositories. This linkage is typically based on bug-fixes identified in developer-enter...
Adrian Bachmann, Christian Bird, Foyzur Rahman, Pr...
SOCIALCOM
2010
13 years 5 months ago
Traffic in Social Media I: Paths Through Information Networks
Wikipedia is used every day by people all around the world, to satisfy a variety of information needs. We crosscorrelate multiple Wikipedia traffic data sets to infer various behav...
Jacob Ratkiewicz, Alessandro Flammini, Filippo Men...
BIOSIG
2009
127views Biometrics» more  BIOSIG 2009»
13 years 5 months ago
Supplemental Biometric User Authentication for Digital-Signature Smart Cards
: This paper specifies how biometric verification methods can be applied in addition to PIN verification on digital-signature smart cards in compliance with established smart-card ...
Olaf Henniger, Ulrich Waldmann
HIPC
2009
Springer
13 years 5 months ago
Fast checkpointing by Write Aggregation with Dynamic Buffer and Interleaving on multicore architecture
Large scale compute clusters continue to grow to ever-increasing proportions. However, as clusters and applications continue to grow, the Mean Time Between Failures (MTBF) has redu...
Xiangyong Ouyang, Karthik Gopalakrishnan, Tejus Ga...
« Prev « First page 1007 / 1025 Last » Next »