Sciweavers

535 search results - page 78 / 107
» Insertion and Expansion Operations for
Sort
View
CHES
2004
Springer
99views Cryptology» more  CHES 2004»
14 years 5 days ago
Defeating Countermeasures Based on Randomized BSD Representations
Abstract. The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in critical operations such as modular exponentiati...
Pierre-Alain Fouque, Frédéric Muller...
ESORICS
2004
Springer
14 years 5 days ago
ARCHERR: Runtime Environment Driven Program Safety
Parameters of a program’s runtime environment such as the machine architecture and operating system largely determine whether a vulnerability can be exploited. For example, the m...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
IPTPS
2004
Springer
14 years 4 days ago
Diminished Chord: A Protocol for Heterogeneous Subgroup Formation in Peer-to-Peer Networks
In most of the P2P systems developed so far, all nodes play essentially the same role. In some applications, however, different machine capabilities or owner preferences may mean ...
David R. Karger, Matthias Ruhl
WDAG
2004
Springer
134views Algorithms» more  WDAG 2004»
14 years 3 days ago
An Optimistic Approach to Lock-Free FIFO Queues
Abstract. First-in-first-out (FIFO) queues are among the most fundamental and highly studied concurrent data structures. The most effective and practical dynamic-memory concurren...
Edya Ladan-Mozes, Nir Shavit
EDBTW
2010
Springer
13 years 12 months ago
The view update problem for XML
We study the problem of update propagation across views in the setting where both the view and the source database are XML documents. We consider a simple class of XML views that ...
Slawek Staworko, Iovka Boneva, Benoît Groz