Sciweavers

2214 search results - page 138 / 443
» complexity 2004
Sort
View
SACRYPT
2004
Springer
136views Cryptology» more  SACRYPT 2004»
14 years 3 months ago
Cryptanalysis of a White Box AES Implementation
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—i.e. an attacker has gained access ...
Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi
WWW
2004
ACM
14 years 11 months ago
A smart hill-climbing algorithm for application server configuration
The overwhelming success of the Web as a mechanism for facilitating information retrieval and for conducting business transactions has led to an increase in the deployment of comp...
Bowei Xi, Zhen Liu, Mukund Raghavachari, Cathy H. ...
PLDI
2004
ACM
14 years 3 months ago
KISS: keep it simple and sequential
The design of concurrent programs is error-prone due to the interaction between concurrently executing threads. Traditional automated techniques for finding errors in concurrent ...
Shaz Qadeer, Dinghao Wu
ICIP
2004
IEEE
14 years 11 months ago
Learning structured dictionaries for image representation
The dictionary approach to signal and image processing has been massively investigated in the last two decades, proving very attractive for a wide range of applications. The effec...
Gianluca Monaci, Pierre Vandergheynst
ADAEUROPE
2004
Springer
14 years 3 months ago
Implementing an Application-Defined Scheduling Framework for Ada Tasking
Abstract: A framework for application-defined scheduling and its corresponding application program interface (API) were defined during the last International Real-Time Ada Workshop...
Mario Aldea Rivas, Francisco Javier Miranda Gonz&a...