Sciweavers

3379 search results - page 569 / 676
» Powers of Two
Sort
View
135
Voted
CSFW
2011
IEEE
14 years 3 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
171
Voted
SIGCOMM
2012
ACM
13 years 6 months ago
Mirror mirror on the ceiling: flexible wireless links for data centers
Modern data centers are massive, and support a range of distributed applications across potentially hundreds of server racks. As their utilization and bandwidth needs continue to ...
Xia Zhou, Zengbin Zhang, Yibo Zhu, Yubo Li, Saipri...
200
Voted
PAMI
2012
13 years 6 months ago
Exploring Context and Content Links in Social Media: A Latent Space Method
—Social media networks contain both content and context-specific information. Most existing methods work with either of the two for the purpose of multimedia mining and retrieva...
Guo-Jun Qi, Charu C. Aggarwal, Qi Tian, Heng Ji, T...
175
Voted
TKDE
2012
194views Formal Methods» more  TKDE 2012»
13 years 6 months ago
A Query Formulation Language for the Data Web
— We present a query formulation language (called MashQL) in order to easily query and fuse structured data on the web. The main novelty of MashQL is that it allows people with l...
Mustafa Jarrar, Marios D. Dikaiakos
121
Voted
ACISP
2009
Springer
15 years 10 months ago
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders
Abstract. Two of the most recent and powerful multi-property-preserving (MPP) hash domain extension transforms are the Ramdom-Oracle-XOR (ROX) transform and the Enveloped Shoup (ES...
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu