Sciweavers

492 search results - page 6 / 99
» Encrypted Shared Data Spaces
Sort
View
235
Voted
CORR
2010
Springer
427views Education» more  CORR 2010»
15 years 27 days ago
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard algori
Genetic algorithms are a population-based Meta heuristics. They have been successfully applied to many optimization problems. However, premature convergence is an inherent charact...
Poonam Garg
101
Voted
ICPPW
1999
IEEE
15 years 6 months ago
Design and Development of a Cooperative Shopping System with Shared Discussion Space
At current on-line shops, buyers almost independently enjoy shopping without anyone's help. However, there are many cases where they cooperate with people such as personal ad...
Takayuki Umeda, Hiroyuki Tarumi, Yahiko Kambayashi
122
Voted
OTM
2005
Springer
15 years 8 months ago
Sharing Context Information in Semantic Spaces
In a highly mobile and active society, ubiquitous access to information and services is a general desire. The context of users is of high importance for an application to adapt aut...
Reto Krummenacher, Jacek Kopecký, Thomas St...
98
Voted
IFIP
2009
Springer
15 years 9 days ago
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers achieve greater security. Proof of possession of authorisation values known as authdata is require...
Liqun Chen, Mark Ryan
125
Voted
DAC
2002
ACM
16 years 3 months ago
Exploiting shared scratch pad memory space in embedded multiprocessor systems
In this paper, we present a compiler strategy to optimize data accesses in regular array-intensive applications running on embedded multiprocessor environments. Specifically, we p...
Mahmut T. Kandemir, J. Ramanujam, Alok N. Choudhar...