Sciweavers

490 search results - page 72 / 98
» Operations on Records
Sort
View
CHI
2001
ACM
14 years 17 days ago
Automating camera management for lecture room environments
Given rapid improvements in network infrastructure and streaming-media technologies, a large number of corporations and universities are recording lectures and making them availab...
Qiong Liu, Yong Rui, Anoop Gupta, Jonathan J. Cadi...
IWMM
2000
Springer
137views Hardware» more  IWMM 2000»
14 years 15 days ago
Cycles to Recycle: Garbage Collection on the IA-64
The IA-64, Intel's 64-bit instruction set architecture, exhibits a number of interesting architectural features. Here we consider those features as they relate to supporting ...
Richard L. Hudson, J. Eliot B. Moss, Sreenivas Sub...
PNPM
1987
14 years 12 days ago
Stochastic Petri Net Analysis of a Replicated File System
We present a stochastic Petri net model of a replicated file system in a distributed environment where replicated files reside on different hosts and a voting algorithm is used to...
Joanne Bechta Dugan, Gianfranco Ciardo
CIKM
2009
Springer
14 years 7 days ago
A framework for semantic link discovery over relational data
Discovering links between different data items in a single data source or across different data sources is a challenging problem faced by many information systems today. In partic...
Oktie Hassanzadeh, Anastasios Kementsietsidis, Lip...
CHES
2008
Springer
144views Cryptology» more  CHES 2008»
13 years 11 months ago
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
Abstract. This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate...
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Ak...