Sciweavers

18572 search results - page 3594 / 3715
» High performance C
Sort
View
DRM
2003
Springer
14 years 2 months ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia
EMMCVPR
2003
Springer
14 years 2 months ago
Asymptotic Characterization of Log-Likelihood Maximization Based Algorithms and Applications
The asymptotic distribution of estimates that are based on a sub-optimal search for the maximum of the log-likelihood function is considered. In particular, estimation schemes that...
Doron Blatt, Alfred O. Hero
FPL
2003
Springer
114views Hardware» more  FPL 2003»
14 years 2 months ago
Power Analysis of FPGAs: How Practical is the Attack?
Recent developments in information technologies made the secure transmission of digital data a critical design point. Large data flows have to be exchanged securely and involve en...
François-Xavier Standaert, Loïc van Ol...
FSTTCS
2003
Springer
14 years 2 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
HIPC
2003
Springer
14 years 2 months ago
GridOS: Operating System Services for Grid Architectures
Abstract— In this work, we demonstrate the power of providing a common set of operating system services to Grid Architectures, including high-performance I/O, communication, reso...
Pradeep Padala, Joseph N. Wilson
« Prev « First page 3594 / 3715 Last » Next »