Sciweavers

1389 search results - page 251 / 278
» Definability as hypercomputational effect
Sort
View
COOPIS
2004
IEEE
14 years 11 days ago
A Framework for Prototyping J2EE Replication Algorithms
In application server systems, such as J2EE, replication is an essential strategy for reliability and efficiency. Many J2EE implementations, both commercial and open-source, provid...
Özalp Babaoglu, Alberto Bartoli, Vance Maveri...
AUSDM
2006
Springer
144views Data Mining» more  AUSDM 2006»
14 years 11 days ago
A Characterization of Wordnet Features in Boolean Models For Text Classification
Supervised text classification is the task of automatically assigning a category label to a previously unlabeled text document. We start with a collection of pre-labeled examples ...
Trevor N. Mansuy, Robert J. Hilderman
DAC
2004
ACM
14 years 11 days ago
Practical repeater insertion for low power: what repeater library do we need?
In this paper, we investigate the problem of repeater insertion for low power under a given timing budget. We propose a novel repeater insertion algorithm to compute the optimal r...
Xun Liu, Yuantao Peng, Marios C. Papaefthymiou
CCS
2006
ACM
14 years 11 days ago
Measuring denial Of service
Denial-of-service (DoS) attacks significantly degrade service quality experienced by legitimate users by introducing long delays, excessive losses, and service interruptions. The ...
Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Ros...
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
14 years 11 days ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...