Sciweavers

1995 search results - page 346 / 399
» What's the Problem
Sort
View
140
Voted
CACM
2010
179views more  CACM 2010»
15 years 3 months ago
x86-TSO: a rigorous and usable programmer's model for x86 multiprocessors
Exploiting the multiprocessors that have recently become ubiquitous requires high-performance and reliable concurrent systems code, for concurrent data structures, operating syste...
Peter Sewell, Susmit Sarkar, Scott Owens, Francesc...
127
Voted
CGF
2008
100views more  CGF 2008»
15 years 3 months ago
Density Displays for Data Stream Monitoring
In many business applications, large data workloads such as sales figures or process performance measures need to be monitored in real-time. The data analysts want to catch proble...
Ming C. Hao, Daniel A. Keim, Umeshwar Dayal, Danie...
147
Voted
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 3 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
CORR
2010
Springer
84views Education» more  CORR 2010»
15 years 3 months ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
121
Voted
CONSTRAINTS
2006
77views more  CONSTRAINTS 2006»
15 years 3 months ago
The Impact of Search Heuristics on Heavy-Tailed Behaviour
Abstract. The heavy-tailed phenomenon that characterises the runtime distributions of backtrack search procedures has received considerable attention over the past few years. Some ...
Tudor Hulubei, Barry O'Sullivan