Sciweavers

811 search results - page 120 / 163
» When Novelty Is Not Enough
Sort
View
ASIACRYPT
2003
Springer
14 years 1 months ago
The Insecurity of Esign in Practical Implementations
Provable security usually makes the assumption that a source of perfectly random and secret data is available. However, in practical applications, and especially when smart cards a...
Pierre-Alain Fouque, Nick Howgrave-Graham, Gwena&e...
DEM
2001
Springer
247views GIS» more  DEM 2001»
14 years 1 months ago
Procedural Geometry for Real-Time Terrain Visualisation in Blueberry3D
A common concern of the real−time terrain visualisation of today is the lack of geometric detail, when the terrain model is studied close enough. This is primary not a problem of...
Mattias Widmark
INFOCOM
2000
IEEE
14 years 1 months ago
Prevention of Deadlocks and Livelocks in Lossless, Backpressured Packet Networks
—When congestion builds up in a packet network, two general approaches are possible to cope with the shortage of buffer space. One approach is to drop incoming packets for which ...
Mark J. Karol, S. Jamaloddin Golestani, David Lee
ASPLOS
2000
ACM
14 years 1 months ago
Thread Level Parallelism and Interactive Performance of Desktop Applications
Multiprocessing is already prevalent in servers where multiple clients present an obvious source of thread-level parallelism. However, the case for multiprocessing is less clear f...
Krisztián Flautner, Richard Uhlig, Steven K...
DATE
2010
IEEE
190views Hardware» more  DATE 2010»
14 years 1 months ago
Ultra-high throughput string matching for Deep Packet Inspection
Deep Packet Inspection (DPI) involves searching a packet's header and payload against thousands of rules to detect possible attacks. The increase in Internet usage and growing...
Alan Kennedy, Xiaojun Wang, Zhen Liu, Bin Liu