Sciweavers

4836 search results - page 867 / 968
» Exploring the Similarity Space
Sort
View
AFRICACRYPT
2009
Springer
14 years 2 months ago
Certified Encryption Revisited
The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registrat...
Pooya Farshim, Bogdan Warinschi
AOSD
2007
ACM
14 years 2 months ago
Join point selectors
One of the main issues in modern aspect-oriented programming languages and frameworks is the expressiveness of the pointcut language or mechanism. The expressiveness of pointcut l...
Cristiano Breuel, Francisco Reverbel
CLUSTER
2007
IEEE
14 years 2 months ago
Identifying energy-efficient concurrency levels using machine learning
Abstract-- Multicore microprocessors have been largely motivated by the diminishing returns in performance and the increased power consumption of single-threaded ILP microprocessor...
Matthew Curtis-Maury, Karan Singh, Sally A. McKee,...
CONEXT
2007
ACM
14 years 2 months ago
Improving service differentiation in IP networks through dual topology routing
The convergence on IP of a wide variety of traffic types has strengthened the need for service differentiation. Service differentiation relies on two equally important components:...
Kin Wah Kwong, Roch Guérin, Anees Shaikh, S...
ER
2007
Springer
109views Database» more  ER 2007»
14 years 2 months ago
Selfish-brain Theory: Challenges in the Top-down Analysis of Metabolic Supply Chains
The Selfish-brain theory has created the theoretical basis for the systemic analysis of the energy metabolism in terms of a supply chain. The energy in form of glucose equivalents...
Dirk Langemann