Sciweavers

3836 search results - page 738 / 768
» Optimizing the Use of High Performance Software Libraries
Sort
View
FSTTCS
2003
Springer
14 years 25 days ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
TRUST
2010
Springer
14 years 20 days ago
Token-Based Cloud Computing
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifia...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel ...
ICDCS
1997
IEEE
13 years 12 months ago
Load Profiling In Distributed Real-Time Systems
Load balancing is often used to ensure that nodes in a distributed systems are equally loaded. In this paper, we show that for real-time systems, load balancing is not desirable. ...
Azer Bestavros
ICHIM
2001
104views more  ICHIM 2001»
13 years 9 months ago
The New Norwegian Rock Art Database
The Rock Art Project was set up by the Directorate for Cultural Heritage on behalf of the Norwegian Ministry of the Environment in 1996. The database was initiated within the EU-s...
Wenche Helliksen, Inger Marie Holm-Olsen, Olaug Ha...
BMCBI
2010
155views more  BMCBI 2010»
13 years 7 months ago
FunctSNP: an R package to link SNPs to functional knowledge and dbAutoMaker: a suite of Perl scripts to build SNP databases
Background: Whole genome association studies using highly dense single nucleotide polymorphisms (SNPs) are a set of methods to identify DNA markers associated with variation in a ...
Stephen J. Goodswen, Cedric Gondro, Nathan S. Wats...