Sciweavers

6574 search results - page 60 / 1315
» Current Signatures: Application
Sort
View
IDEAS
2003
IEEE
131views Database» more  IDEAS 2003»
14 years 4 months ago
Neighborhood Signatures for Searching P2P Networks
Overlay networks have received a lot of attention due to the recent wide-spread use of peer-to-peer (P2P) applications such as SETI, Napster, Gnutella, and Morpheus. Through repli...
Mei Li, Wang-Chien Lee, Anand Sivasubramaniam
ASPLOS
2008
ACM
14 years 24 days ago
Hardware counter driven on-the-fly request signatures
Today's processors provide a rich source of statistical information on application execution through hardware counters. In this paper, we explore the utilization of these sta...
Kai Shen, Ming Zhong, Sandhya Dwarkadas, Chuanpeng...
SIGMOD
2002
ACM
147views Database» more  SIGMOD 2002»
14 years 11 months ago
Conceptual Model of Web Service Reputation
Current Web services standards enable publishing service descriptions and finding services on a match based on criteria such as method signatures or service category. However, cur...
E. Michael Maximilien, Munindar P. Singh
BMCBI
2005
153views more  BMCBI 2005»
13 years 10 months ago
Mining published lists of cancer related microarray experiments: Identification of a gene expression signature having a critical
Background: Routine application of gene expression microarray technology is rapidly producing large amounts of data that necessitate new approaches of analysis. The analysis of a ...
Giacomo Finocchiaro, Francesco Mancuso, Heiko M&uu...
CTRSA
2001
Springer
129views Cryptology» more  CTRSA 2001»
14 years 3 months ago
Formal Security Proofs for a Signature Scheme with Partial Message Recovery
The Pintsov-Vanstone signature scheme with partial message recovery (PVSSR) is a variant of the Schnorr and Nyberg-Rueppel signature schemes. It produces very short signatures on ...
Daniel R. L. Brown, Donald Byron Johnson