Sciweavers

2226 search results - page 317 / 446
» Computable Analysis via Representations
Sort
View
HIPC
2009
Springer
15 years 2 months ago
Extracting the textual and temporal structure of supercomputing logs
Supercomputers are prone to frequent faults that adversely affect their performance, reliability and functionality. System logs collected on these systems are a valuable resource o...
Sourabh Jain, Inderpreet Singh, Abhishek Chandra, ...
IEEECGIV
2009
IEEE
15 years 2 months ago
TagReel: A Visualization of Tag Relations among User Interests in the Social Tagging System
Social tagging systems provide users with the ability to share information and extend their field of knowledge. The purpose of this paper is to explore the tag relations of user in...
Joohee Bae, Kyungwon Lee
305
Voted
PE
2011
Springer
365views Optimization» more  PE 2011»
14 years 11 months ago
Optimal resource allocation for time-reservation systems
This paper studies the optimal resource allocation in time-reservation systems. Customers arrive at a service facility and receive service in two steps; in the first step informa...
Ran Yang, Sandjai Bhulai, Rob van der Mei, Frank J...
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
14 years 8 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
224
Voted
CSFW
2011
IEEE
14 years 4 months ago
Dynamic Enforcement of Knowledge-Based Security Policies
—This paper explores the idea of knowledge-based security policies, which are used to decide whether to answer queries over secret data based on an estimation of the querier’s ...
Piotr Mardziel, Stephen Magill, Michael Hicks, Mud...