Sciweavers

838 search results - page 41 / 168
» Propagation Redundancy in Redundant Modelling
Sort
View
ACNS
2005
Springer
94views Cryptology» more  ACNS 2005»
14 years 3 months ago
Optimal Asymmetric Encryption and Signature Paddings
Strong security notions often introduce strong constraints on the construction of cryptographic schemes: semantic security implies probabilistic encryption, while the resistance to...
Benoît Chevallier-Mames, Duong Hieu Phan, Da...
WEBI
2005
Springer
14 years 3 months ago
Efficient Extraction of Closed Motivic Patterns in Multi-Dimensional Symbolic Representations of Music
In this paper, we present an efï¬cient model for discovering repeated patterns in symbolic representations of music. Combinatorial redundancy inherent to the pattern discovery pa...
Olivier Lartillot
ISMIR
2004
Springer
95views Music» more  ISMIR 2004»
14 years 3 months ago
A multi-parametric and redundancy-filtering approach to pattern identification
This paper presents the principles of a new approach aimed at automatically discovering motivic patterns in monodies. It is shown that, for the results to agree with the listenerâ...
Olivier Lartillot
DSN
2008
IEEE
13 years 11 months ago
Reliability of flat XOR-based erasure codes on heterogeneous devices
XOR-based erasure codes are a computationallyefficient means of generating redundancy in storage systems. Some such erasure codes provide irregular fault tolerance: some subsets o...
Kevin M. Greenan, Ethan L. Miller, Jay J. Wylie
GLOBE
2011
Springer
12 years 9 months ago
Hybrid Approaches for Distributed Storage Systems
Abstract. Distributed or peer-to-peer storage solutions rely on the introduction of redundant data to be fault-tolerant and to achieve high reliability. One way to introduce redund...
Júlio Araújo, Frédéric...