Sciweavers

393 search results - page 39 / 79
» The LCA Problem Revisited
Sort
View
126
Voted
IPPS
2005
IEEE
15 years 9 months ago
FROST: Revisited and Distributed
FROST (Fold Recognition-Oriented Search Tool) [6] is a software whose purpose is to assign a 3D structure to a protein sequence. It is based on a series of filters and uses a dat...
Vincent Poirriez, Rumen Andonov, Antoine Marin, Je...
120
Voted
CCS
2005
ACM
15 years 9 months ago
Keyboard acoustic emanations revisited
We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard, and t...
Li Zhuang, Feng Zhou, J. D. Tygar
116
Voted
PKC
2005
Springer
110views Cryptology» more  PKC 2005»
15 years 9 months ago
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited
To sign with RSA, one usually encodes the message m as µ(m) and then raises the result to the private exponent modulo N. In Asiacrypt 2000, Coron et al. showed how to build a secu...
Julien Cathalo, Jean-Sébastien Coron, David...
WCRE
2002
IEEE
15 years 8 months ago
Disassembly of Executable Code Revisited
Machine code disassembly routines form a fundamental component of software systems that statically analyze or modify executable programs. The task of disassembly is complicated by...
Benjamin Schwarz, Saumya K. Debray, Gregory R. And...
118
Voted
INFOCOM
2000
IEEE
15 years 7 months ago
TCP Vegas Revisited
Abstract—The innovative techniques of TCP Vegas have been the subject of much debate in recent years. Several studies have reported that TCP Vegas provides better performance tha...
Urs Hengartner, Jürg Bolliger, Thomas R. Gros...