Sciweavers

1516 search results - page 15 / 304
» How Open is e-Science
Sort
View
106
Voted
CDC
2008
IEEE
15 years 4 months ago
Informative data: How to get just sufficiently rich?
Prediction error identification requires that data be informative with respect to the chosen model structure. Whereas sufficient conditions for informative experiments have been av...
Michel Gevers, Alexandre S. Bazanella, Ljubisa Mis...
102
Voted
FSE
2008
Springer
110views Cryptology» more  FSE 2008»
15 years 4 months ago
How to Encrypt with a Malicious Random Number Generator
Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving an adversary access to an oracle that encrypts a given message m using random coins that ...
Seny Kamara, Jonathan Katz
USS
2004
15 years 3 months ago
Fixing Races for Fun and Profit: How to Use access(2)
It is well known that it is insecure to use the access(2) system call in a setuid program to test for the ability of the program's executor to access a file before opening sa...
Drew Dean, Alan J. Hu
ESCIENCE
2006
IEEE
15 years 8 months ago
Enabling e-Research in Combustion Research Community
This paper proposes an application of the Collaborative e-Science Architecture (CeSA) to enable e-Research in combustion research community. A major problem of the community is th...
Tran Vu Pham, Peter M. Dew, Lydia M. S. Lau, Micha...
113
Voted
ESCIENCE
2006
IEEE
15 years 8 months ago
TextGrid and eHumanities
TextGrid is a new Grid project in the framework of the German D-Grid initiative, with the aim to deploy Grid technologies for humanities scholars working on historical (German) te...
Peter Gietz, Andreas Aschenbrenner, Stefan Bü...