Sciweavers

5675 search results - page 176 / 1135
» Exploiting Chaos for Computation
Sort
View
144
Voted
SC
2005
ACM
15 years 10 months ago
Scheduling speculative tasks in a compute farm
Users often behave speculatively, submitting work that initially they do not know is needed. Farm computing often consists of single node speculative tasks issued by, e.g., bioinf...
David Petrou, Garth A. Gibson, Gregory R. Ganger
148
Voted
ISMIS
2005
Springer
15 years 10 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
IPPS
2002
IEEE
15 years 9 months ago
Next Generation System Software for Future High-End Computing Systems
Future high-end computers will offer great performance improvements over today’s machines, enabling applications of far greater complexity. However, designers must solve the cha...
Guang R. Gao, Kevin B. Theobald, Ziang Hu, Haiping...
142
Voted
ICALP
1998
Springer
15 years 8 months ago
A Neuroidal Architecture for Cognitive Computation
An architecture is described for designing systems that acquire and manipulate large amounts of unsystematized, or so-called commonsense, knowledge. Its aim is to exploit to the fu...
Leslie G. Valiant
CRYPTO
1995
Springer
135views Cryptology» more  CRYPTO 1995»
15 years 8 months ago
Committed Oblivious Transfer and Private Multi-Party Computation
Abstract. In this paper we present an eficient protocol for “Committed Oblivious Transfer” to perform oblivious transfer on committed bits: suppose Alice is committed to bits 0...
Claude Crépeau, Jeroen van de Graaf, Alain ...