Sciweavers

1042 search results - page 138 / 209
» Failing First: An Update
Sort
View
ASIACRYPT
2003
Springer
14 years 3 months ago
Leakage-Resilient Authenticated Key Establishment Protocols
Authenticated Key Establishment (AKE) protocols enable two entities, say a client (or a user) and a server, to share common session keys in an authentic way. In this paper, we revi...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
HAPTICS
2002
IEEE
14 years 2 months ago
Computationally Efficient Techniques for Real Time Surgical Simulation with Force Feedback
In this paper, we present computationally efficient algorithms for the real time simulation of minimally invasive surgical (MIS) procedures. To develop a surgical simulator for tr...
Jung Kim, Suvranu De, Mandayam A. Srinivasan
PCM
2001
Springer
183views Multimedia» more  PCM 2001»
14 years 2 months ago
An Adaptive Index Structure for High-Dimensional Similarity Search
A practical method for creating a high dimensional index structure that adapts to the data distribution and scales well with the database size, is presented. Typical media descrip...
Peng Wu, B. S. Manjunath, Shivkumar Chandrasekaran
VLDB
2001
ACM
121views Database» more  VLDB 2001»
14 years 2 months ago
Weaving Relations for Cache Performance
Relational database systems have traditionally optimzed for I/O performance and organized records sequentially on disk pages using the N-ary Storage Model (NSM) (a.k.a., slotted p...
Anastassia Ailamaki, David J. DeWitt, Mark D. Hill...
ICDCS
2000
IEEE
14 years 2 months ago
Static and Adaptive Data Replication Algorithms for Fast Information Access in Large Distributed Systems
Creating replicas of frequently accessed objects across a read-intensive network can result in large bandwidth savings which, in turn, can lead to reduction in user response time....
Thanasis Loukopoulos, Ishfaq Ahmad