• BKZ

  • Referenced in 66 articles [sw10242]
  • least 93-bit security against key-recovery lattice attacks, actually offers at most...
  • LEX

  • Referenced in 19 articles [sw19585]
  • this article we present a key recovery attack on LEX. The attack requires about...
  • TetGen

  • Referenced in 179 articles [sw04046]
  • other related areas. It describes the key software components of TetGen, including an efficient tetrahedral ... constraints (edges and triangles), a new edge recovery algorithm for recovering constraints...
  • Pastry

  • Referenced in 107 articles [sw11775]
  • nodeId that is numerically closest to the key, among all currently live Pastry nodes. Each ... node arrivals, node failures and recoveries. Pastry takes into account network locality; it seeks...
  • PostgreSQL

  • Referenced in 78 articles [sw15935]
  • ACID compliant, has full support for foreign keys, joins, views, triggers, and stored procedures ... Version Concurrency Control (MVCC), point in time recovery, tablespaces, asynchronous replication, nested transactions (savepoints), online/hot...
  • LogGC

  • Referenced in 1 article [sw39052]
  • ramifications of an attack for recovery from it. A key challenge of audit log-based...
  • BibTool

  • Referenced in 1 article [sw33721]
  • recovery; Semantic checks; Sorting and merging of data bases; Generation of uniform reference keys according...
  • FPTree

  • Referenced in 1 article [sw29930]
  • placed in DRAM and rebuilt upon recovery. The FPTree uses Fingerprinting, a technique that limits ... expected number of in-leaf probed keys to one. In addition, we propose a hybrid...
  • Drizzle

  • Referenced in 1 article [sw28750]
  • incur high overheads during adaptation (e.g., recovery), while micro-batch systems, such as Spark Streaming ... high latency during normal operations. Our key observation is that while streaming workloads require millisecond ... having up to 13x lower latency during recovery...
  • TDDAD

  • Referenced in 2 articles [sw38851]
  • controller. Software defined network (SDN) is the key part of the next generation networks ... attack. Then either a defense or recovery action will be taken. We test our scheme...
  • ARMORED

  • Referenced in 1 article [sw37370]
  • data recovery tool FROST was released which exploits the remanence effect of RAM to recover ... smart phone, at worst its disk encryption key. Disk encryption is supported in Android since...
  • DDFS3D

  • Referenced in 1 article [sw39912]
  • recent years, exemplified by shale gas recovery, nuclear waste disposal and enhanced geothermal systems. Displacement ... research are rare, and one of the key reasons lies in the inconvenient access...
  • MIxBN

  • Referenced in 1 article [sw39155]
  • algorithm and the evolutionary algorithm. Thus the key capabilities of the proposed library ... context of solving approximation and gap recovery problems on synthetic data and real datasets...
  • Magma

  • Referenced in 3296 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Maple

  • Referenced in 5363 articles [sw00545]
  • The result of over 30 years of cutting...
  • MapReduce

  • Referenced in 262 articles [sw00546]
  • MapReduce is a new parallel programming model initially...
  • Mathematica

  • Referenced in 6337 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Matlab

  • Referenced in 13460 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • R

  • Referenced in 9810 articles [sw00771]
  • R is a language and environment for statistical...
  • SageMath

  • Referenced in 1970 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...