Sciweavers

565 search results - page 86 / 113
» Parallel Querying with Non-Dedicated Computers
Sort
View
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
14 years 1 months ago
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
Abstract. In this paper, we propose a 2/3-rate double length compression function and study its security in the black-box model. We prove that to get a collision attack for the com...
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin ...
ICDCSW
2003
IEEE
14 years 1 months ago
Optimal Transmission Radius for Flooding in Large Scale Sensor Networks
—One of the principal characteristics of large scale wireless sensor networks is their distributed, multi-hop nature. Due to this characteristic, applications such as query propa...
Marco Zuniga, Bhaskar Krishnamachari
AINA
2009
IEEE
14 years 27 days ago
A Generic Database Web Service for the Venice Service Grid
This work describes a generic database service for the lightweight Venice Service Grid, which has been developed at the University of Kaiserslautern, Germany. By using Web service...
Michael Koch, Markus Hillenbrand, Paul Müller
AAAI
2010
13 years 9 months ago
g-Planner: Real-time Motion Planning and Global Navigation using GPUs
We present novel randomized algorithms for solving global motion planning problems that exploit the computational capabilities of many-core GPUs. Our approach uses thread and data...
Jia Pan, Christian Lauterbach, Dinesh Manocha
IPPS
2008
IEEE
14 years 2 months ago
Multi-threaded data mining of EDGAR CIKs (Central Index Keys) from ticker symbols
This paper describes how use the Java Swing HTMLEditorKit to perform multi-threaded web data mining on the EDGAR system (Electronic DataGathering, Analysis, and Retrieval system)....
Dougal A. Lyon