Sciweavers

4217 search results - page 748 / 844
» The Small Model Property: How Small Can It Be
Sort
View
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
14 years 1 months ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool
HICSS
1999
IEEE
153views Biometrics» more  HICSS 1999»
14 years 1 months ago
Search Patterns in Hypertext Exhibits
As access to hypermedia documents becomes generally available, it becomes increasingly important to understand how casual users search for information. We have studied search patt...
Joan C. Nordbotten, Svein Nordbotten
HPCA
1998
IEEE
14 years 1 months ago
Communication Across Fault-Containment Firewalls on the SGI Origin
Scalability and reliability are inseparable in high-performance computing. Fault-isolation through hardware is a popular means of providing reliability. Unfortunately, such isolat...
Kaushik Ghosh, Allan J. Christie
RAID
1999
Springer
14 years 1 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
VLSID
1998
IEEE
116views VLSI» more  VLSID 1998»
14 years 1 months ago
Synthesis of Testable RTL Designs
With several commercial tools becoming available, the high-level synthesis of applicationspeci c integrated circuits is nding wide spread acceptance in VLSI industry today. Existi...
C. P. Ravikumar, Sumit Gupta, Akshay Jajoo