Sciweavers

762 search results - page 36 / 153
» Finding SHA-1 Characteristics: General Results and Applicati...
Sort
View
MASCOTS
2008
13 years 10 months ago
Optimizing Galois Field Arithmetic for Diverse Processor Architectures and Applications
Galois field implementations are central to the design of many reliable and secure systems, with many systems implementing them in software. The two most common Galois field opera...
Kevin M. Greenan, Ethan L. Miller, Thomas J. E. Sc...
GEOS
2005
Springer
14 years 2 months ago
Processes and Events in Dynamic Geo-Networks
Traditional spatial information systems hold only a single state of the ‘real world’. However, geographic phenomena have not only static but dynamic characteristics. The work d...
Antony Galton, Michael F. Worboys
DIS
2007
Springer
14 years 2 months ago
Unsupervised Spam Detection Based on String Alienness Measures
We propose an unsupervised method for detecting spam documents from Web page data, based on equivalence relations on strings. We propose 3 measures for quantifying the alienness (...
Kazuyuki Narisawa, Hideo Bannai, Kohei Hatano, Mas...
ASPLOS
2008
ACM
13 years 10 months ago
Dispersing proprietary applications as benchmarks through code mutation
Industry vendors hesitate to disseminate proprietary applications to academia and third party vendors. By consequence, the benchmarking process is typically driven by standardized...
Luk Van Ertvelde, Lieven Eeckhout
IPPS
2007
IEEE
14 years 2 months ago
A Performance Prediction Framework for Grid-Based Data Mining Applications
For a grid middleware to perform resource allocation, prediction models are needed, which can determine how long an application will take for completion on a particular platform o...
Leonid Glimcher, Gagan Agrawal