Sciweavers

5863 search results - page 1079 / 1173
» On Model-Checking of P Systems
Sort
View
126
Voted
CTRSA
2012
Springer
229views Cryptology» more  CTRSA 2012»
13 years 11 months ago
Practical Realisation and Elimination of an ECC-Related Software Bug Attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...
SIGCOMM
2012
ACM
13 years 6 months ago
User-level data center tomography
Measurement and inference in data centers present a set of opportunities and challenges distinct from the Internet domain. Existing toolsets may be perturbed or be mislead by issu...
Neil Alexander Twigg, Marwan Fayed, Colin Perkins,...
ICDE
2012
IEEE
277views Database» more  ICDE 2012»
13 years 6 months ago
Lookup Tables: Fine-Grained Partitioning for Distributed Databases
—The standard way to scale a distributed OLTP DBMS is to horizontally partition data across several nodes. Ideally, this results in each query/transaction being executed at just ...
Aubrey Tatarowicz, Carlo Curino, Evan P. C. Jones,...
136
Voted
BIOINFORMATICS
2012
13 years 6 months ago
SSuMMo: rapid analysis, comparison and visualization of microbial communities
Motivation: Next-generation sequencing methods are generating increasingly massive datasets, yet still do not fully capture genetic diversity in the richest environments. To under...
Alex L. B. Leach, James P. J. Chong, Kelly R. Rede...
COCO
2003
Springer
118views Algorithms» more  COCO 2003»
15 years 9 months ago
Lower bounds for predecessor searching in the cell probe model
We consider a fundamental problem in data structures, static predecessor searching: Given a subset S of size n from the universe [m], store S so that queries of the form “What i...
Pranab Sen
« Prev « First page 1079 / 1173 Last » Next »