Sciweavers

628 search results - page 101 / 126
» On the Twofish Key Schedule
Sort
View
CEAS
2005
Springer
14 years 1 months ago
Email Task Management: An Iterative Relational Learning Approach
Today’s email clients were designed for yesterday’s email. Originally, email was merely a communication medium. Today, people engage in a variety of complex behaviours using e...
Rinat Khoussainov, Nicholas Kushmerick
CISC
2005
Springer
120views Cryptology» more  CISC 2005»
14 years 1 months ago
Towards a General RC4-Like Keystream Generator
RC4 was designed in 1987 when 8-bit and 16-bit processors were commercially available. Today, most processors use 32-bit or 64bit words but using original RC4 with 32/64 bits is in...
Guang Gong, Kishan Chand Gupta, Martin Hell, Yassi...
EGC
2005
Springer
14 years 1 months ago
The Gridkit Distributed Resource Management Framework
Traditionally, distributed resource management/ scheduling systems for the Grid (e.g. Globus/ GRAM/ Condor-G) have tended to deal with coarsegrained and concrete resource types (e....
Wei Cai, Geoff Coulson, Paul Grace, Gordon S. Blai...
ICWE
2005
Springer
14 years 1 months ago
An Investigation of Cloning in Web Applications
Cloning (ad hoc reuse by duplication of design or code) speeds up development, but also hinders future maintenance. Cloning also hints at reuse opportunities that, if exploited sys...
Damith C. Rajapakse, Stan Jarzabek
LCPC
2004
Springer
14 years 1 months ago
A Geometric Approach for Partitioning N-Dimensional Non-rectangular Iteration Spaces
Abstract. Parallel loops account for the greatest percentage of program parallelism. The degree to which parallelism can be exploited and the amount of overhead involved during par...
Arun Kejariwal, Paolo D'Alberto, Alexandru Nicolau...