Sciweavers

1898 search results - page 153 / 380
» Weak Keys for IDEA
Sort
View
VLDB
2005
ACM
85views Database» more  VLDB 2005»
14 years 2 months ago
Inspector Joins
The key idea behind Inspector Joins is that during the I/O partitioning phase of a hash-based join, we have the opportunity to look at the actual data itself and then use this kno...
Shimin Chen, Anastassia Ailamaki, Phillip B. Gibbo...
SIGCSE
2004
ACM
140views Education» more  SIGCSE 2004»
14 years 2 months ago
CS1 assessment using memory diagrams
Understanding the execution of an object-oriented program can be a challenge for a student starting a CS1 course. We believe that a type of diagram that we call a memory diagram c...
Mark A. Holliday, David Luginbuhl
EAGC
2004
Springer
14 years 2 months ago
Grid Infrastructure Monitoring as Reliable Information Service
A short overview of Grid infrastructure status monitoring is given followed by a discussion of key concepts for advanced status monitoring systems: passive information gathering ba...
Petr Holub, Martin Kuba, Ludek Matyska, Miroslav R...
INDOCRYPT
2004
Springer
14 years 2 months ago
A Provably Secure Elliptic Curve Scheme with Fast Encryption
Abstract. We present a new elliptic curve cryptosystem with fast encryption and key generation, which is provably secure in the standard model. The scheme uses arithmetic modulo n2...
David Galindo, Sebastià Martín Molle...
ISMS
2004
Springer
14 years 2 months ago
Coherent Scene Generation for Surgical Simulators
The idea of using computer-based surgical simulators for training of prospective surgeons has been a topic of research for more than a decade. However, surgical simulation is still...
Raimundo Sierra, Michael Bajka, Celalettin Karadog...