Sciweavers

663 search results - page 34 / 133
» PKI design for the real world
Sort
View
FSE
1997
Springer
131views Cryptology» more  FSE 1997»
13 years 11 months ago
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor
Most encryption algorithms are designed without regard to their performance on top-of-the-line microprocessors. This paper discusses general optimization principles algorithms desi...
Bruce Schneier, Doug Whiting
EUROPAR
2007
Springer
14 years 1 months ago
Adaptable Distance-Based Decision-Making Support in Dynamic Cross-Grid Environment
The grid environment presents numerous opportunities for business applications as well as for scientific ones. Nevertheless the current trends seem to lead to several independent ...
Julien Gossa, Jean-Marc Pierson, Lionel Brunie
WSC
2007
13 years 10 months ago
Enabling industrial scale simulation/emulation models
OLE Process Control (OPC) is an industry standard that facilitates the communication between PCs and Programmable Logic Controllers (PLC). This communication allows for the testin...
Michael Johnstone, Douglas C. Creighton, Saeid Nah...
ICONIP
2004
13 years 9 months ago
Hybrid Feature Selection for Modeling Intrusion Detection Systems
Most of the current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (...
Srilatha Chebrolu, Ajith Abraham, Johnson P. Thoma...
COLT
1991
Springer
13 years 11 months ago
The Role of Learning in Autonomous Robots
Applications of learning to autonomous agents (simulated or real) have often been restricted to learning a mapping from perceived state of the world to the next action to take. Of...
Rodney A. Brooks