Sciweavers

155 search results - page 30 / 31
» Genetic Programming for Improved Receiver Operating Characte...
Sort
View
EUROCRYPT
2008
Springer
13 years 9 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
CORR
2011
Springer
183views Education» more  CORR 2011»
13 years 2 months ago
Automatic Network Fingerprinting through Single-Node Motifs
Complex networks have been characterised by their specific connectivity patterns (network motifs), but their building blocks can also be identified and described by node-motifs—...
Christoph Echtermeyer, Luciano da Fontoura Costa, ...
ASPLOS
2000
ACM
13 years 11 months ago
Symbiotic Jobscheduling for a Simultaneous Multithreading Processor
Simultaneous Multithreading machines fetch and execute instructions from multiple instruction streams to increase system utilization and speedup the execution of jobs. When there ...
Allan Snavely, Dean M. Tullsen
IEEEPACT
2005
IEEE
14 years 1 months ago
HUNTing the Overlap
Hiding communication latency is an important optimization for parallel programs. Programmers or compilers achieve this by using non-blocking communication primitives and overlappi...
Costin Iancu, Parry Husbands, Paul Hargrove
ASPLOS
2009
ACM
14 years 8 months ago
TwinDrivers: semi-automatic derivation of fast and safe hypervisor network drivers from guest OS drivers
In a virtualized environment, device drivers are often run inside a virtual machine (VM) rather than in the hypervisor, for reasons of safety and reduction in software engineering...
Aravind Menon, Simon Schubert, Willy Zwaenepoel