Sciweavers

501 search results - page 10 / 101
» Redundancy and Diversity in Security
Sort
View
USENIX
2008
13 years 11 months ago
Diverse Replication for Single-Machine Byzantine-Fault Tolerance
New single-machine environments are emerging from abundant computation available through multiple cores and secure virtualization. In this paper, we describe the research challeng...
Byung-Gon Chun, Petros Maniatis, Scott Shenker
ICML
2010
IEEE
13 years 7 months ago
Learning optimally diverse rankings over large document collections
Most learning to rank research has assumed that the utility of different documents is independent, which results in learned ranking functions that return redundant results. The fe...
Aleksandrs Slivkins, Filip Radlinski, Sreenivas Go...
ASIACRYPT
2000
Springer
14 years 1 months ago
From Fixed-Length to Arbitrary-Length RSA Padding Schemes
A common practice for signing with RSA is to first apply a hash function or a redundancy function to the message, add some padding and exponentiate the resulting padded message us...
Jean-Sébastien Coron, François Koeun...
ACISP
2005
Springer
13 years 11 months ago
Redundant Trinomials for Finite Fields of Characteristic 2
Abstract. In this article we introduce redundant trinomials to represent elements of finite fields of characteristic 2. This paper develops applications to cryptography, especial...
Christophe Doche
TSMC
2008
102views more  TSMC 2008»
13 years 8 months ago
Context-Dependent DNA Coding With Redundancy and Introns
Abstract--Deoxyribonucleic acid (DNA) coding methods determine the meaning of a certain character in individual chromosomes by the characters surrounding it. The meaning of each ch...
Peng Xiao, Prahlad Vadakkepat, Tong Heng Lee