Sciweavers

490 search results - page 80 / 98
» Equivalent Keys of HPC
Sort
View
IEEECIT
2005
IEEE
14 years 2 months ago
Interactive Web Service Choice-Making Based on Extended QoS Model
: Quality of Service (QoS) is a key factor in Web service advertising, choosing and runtime monitoring. Web service QoS is multi-faceted, fuzzy and dynamic. Current researches focu...
Yujie Mou, Jian Cao, Shen-sheng Zhang, Jianhong Zh...
AFRICACRYPT
2009
Springer
14 years 20 days ago
Certified Encryption Revisited
The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registrat...
Pooya Farshim, Bogdan Warinschi
BMCBI
2008
127views more  BMCBI 2008»
13 years 8 months ago
MetaMine - A tool to detect and analyse gene patterns in their environmental context
Background: Modern sequencing technologies allow rapid sequencing and bioinformatic analysis of genomes and metagenomes. With every new sequencing project a vast number of new pro...
Uta Bohnebeck, Thierry Lombardot, Renzo Kottmann, ...
JACM
2007
132views more  JACM 2007»
13 years 8 months ago
Dynamic ordered sets with exponential search trees
We introduce exponential search trees as a novel technique for converting static polynomial space search structures for ordered sets into fully-dynamic linear space data structure...
Arne Andersson, Mikkel Thorup
JAR
2000
145views more  JAR 2000»
13 years 8 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro