Sciweavers

4903 search results - page 842 / 981
» The Set Covering Machine
Sort
View
LICS
1999
IEEE
14 years 1 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
HIPC
1999
Springer
14 years 1 months ago
High Performance Data Mining
Abstract. Recent times have seen an explosive growth in the availability of various kinds of data. It has resulted in an unprecedented opportunity to develop automated data-driven ...
Vipin Kumar, Jaideep Srivastava
ICIAP
1999
ACM
14 years 1 months ago
Determining the Skeletons of the Auroras
The auroral emissions observed in the high-latitude regions encircling the magnetic poles are a key element in studying plasmaphysical processes in the near-Earth space, the magne...
Mikko T. Syrjäsuo, Tuija I. Pulkkinen
EUROMICRO
1998
IEEE
14 years 1 months ago
SMP PCs: A Case Study on Cluster Computing
As commodity microprocessors and networks reach performance levels comparable to those used in massively parallel processors, clusters of symmetric multiprocessors are starting to...
Antônio Augusto Fröhlich, Wolfgang Schr...
HPDC
1998
IEEE
14 years 1 months ago
WebOS: Operating System Services for Wide Area Applications
In this paper, we argue for the power of providing a common set of OS services to wide area applications, including mechanisms for resource discovery, a global namespace, remote p...
Amin Vahdat, Thomas E. Anderson, Michael Dahlin, E...