Sciweavers

7486 search results - page 1412 / 1498
» The Limits of Quantum Computers
Sort
View
STORAGESS
2005
ACM
14 years 3 months ago
Expecting the unexpected: adaptation for predictive energy conservation
The use of access predictors to improve storage device performance has been investigated for both improving access times, as well as a means of reducing energy consumed by the dis...
Jeffrey P. Rybczynski, Darrell D. E. Long, Ahmed A...
AIIA
2005
Springer
14 years 3 months ago
Towards Fault-Tolerant Formal Concept Analysis
Given Boolean data sets which record properties of objects, Formal Concept Analysis is a well-known approach for knowledge discovery. Recent application domains, e.g., for very lar...
Ruggero G. Pensa, Jean-François Boulicaut
CCS
2005
ACM
14 years 3 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
CCS
2005
ACM
14 years 3 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
CIKM
2005
Springer
14 years 3 months ago
Semantic similarity over the gene ontology: family correlation and selecting disjunctive ancestors
Many bioinformatics applications would benefit from comparing proteins based on their biological role rather than their sequence. In most biological databases, proteins are alrea...
Francisco M. Couto, Mário J. Silva, Pedro C...
« Prev « First page 1412 / 1498 Last » Next »