Sciweavers

1852 search results - page 229 / 371
» From Bi-ideals to Periodicity
Sort
View
SCN
2010
Springer
144views Communications» more  SCN 2010»
13 years 8 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
SEUS
2010
IEEE
13 years 8 months ago
Crash Recovery in FAST FTL
NAND flash memory is one of the non-volatile memories and has been replacing hard disk in various storage markets from mobile devices, PC/Laptop computers, even to enterprise serv...
Sungup Moon, Sang-Phil Lim, Dong-Joo Park, Sang-Wo...
ISPASS
2010
IEEE
13 years 8 months ago
Weak execution ordering - exploiting iterative methods on many-core GPUs
Abstract--On NVIDIA's many-core GPUs, there is no synchronization function among parallel thread blocks. When finegranularity of data communication and synchronization is requ...
Jianmin Chen, Zhuo Huang, Feiqi Su, Jih-Kwon Peir,...
CANDC
2009
ACM
13 years 8 months ago
A tale of two online communities: fostering collaboration and creativity in scientists and children
There has been much recent interest in the development of tools to foster remote collaboration and shared creative work. An open question is: what are the guidelines for this proc...
Cecilia R. Aragon, Sarah S. Poon, Andrés Mo...
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 7 months ago
An In-depth Analysis of Spam and Spammers
Electronic mail services have become an important source of communication for millions of people all over the world. Due to this tremendous growth, there has been a significant in...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...