A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2003; you can also visit the original URL.
The file type is application/pdf
.
Filters
Avoiding Algorithmic Obfuscation in a Message-Driven Parallel MD Code
[chapter]
1999
Lecture Notes in Computational Science and Engineering
In order to avoid obfuscation of the simulation algorithm by the parallel framework, the algorithm associated with a patch is encapsulated by a single function executing in a separate thread. ...
The execution of compute objects takes place in a prioritized message-driven manner, allowing maximum overlap of work and communication without significant programmer effort. ...
from the complex logic of a message-driven parallel code. ...
doi:10.1007/978-3-642-58360-5_28
fatcat:ek7yeejkbjfy3lmc4csj7ssrqi
Gaming security by obscurity
[article]
2012
arXiv
pre-print
In fact, modern cryptography goes even further than Shannon or Kerckhoffs in tacitly assuming that *if there is an algorithm that can break the system, then the attacker will surely find that algorithm ...
This view is still endorsed in cryptography. ...
The task of obfuscation is to transform a program representation so that the obfuscated program runs roughly the same as the original one, but that the original code (or some secrets built into it) cannot ...
arXiv:1109.5542v4
fatcat:i5k7csvk5jbsna7yy3f77r3734
Scalable molecular dynamics with NAMD
2005
Journal of Computational Chemistry
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. ...
The motivations for and a roadmap to the internal design of NAMD, implemented in Cϩϩ and based on Charmϩϩ parallel objects, are outlined. ...
Acknowledgments The NAMD source code has been written, revised, and extended by many talented individuals, including (in alphabetical order) Milind Bhandarkar, Robert Brunner, Christophe Chipot, Andrew ...
doi:10.1002/jcc.20289
pmid:16222654
pmcid:PMC2486339
fatcat:ltac7t3jtrbkngvn33tkmemmta
On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques
2016
IEEE Access
For example, a loose definition of robustness might be in terms of the resilience of a watermark against normal host data operations, and of invisibility as resilience of the data interpretation against ...
With the aid of a few examples of watermarking applications, we demonstrate these distinctions and we look at the latest research in this regard to make our argument clear and more meaningful. ...
After encrypting the message and possibly appending a error correction code, it is converted into a perturbation code to be hidden in the original shape. ...
doi:10.1109/access.2016.2570812
fatcat:2xxteahvprepzekaqqbbyey7hi
An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends
2021
IEEE Access
This closed-design paradigm has limited the capability of the switches to proprietary implementations which are hard-coded by vendors, inducing a lengthy, costly, and inflexible process. ...
Despite the impressive advantages of programmable data plane switches and their importance in modern networks, the literature has been missing a comprehensive survey. ...
Additionally, the signaling protocol and multicast algorithm are hard coded in the router, which reduces flexibility in building and managing the tree. ...
doi:10.1109/access.2021.3086704
fatcat:2jgbxj2cbfbp7fawkxwrztbbia
An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends
[article]
2021
arXiv
pre-print
Despite the impressive advantages of programmable data plane switches and their importance in modern networks, the literature has been missing a comprehensive survey. ...
Recently, data plane programmability has attracted significant attention from both the research community and the industry, permitting operators and programmers in general to run customized packet processing ...
Additionally, the signaling protocol and multicast algorithm are hard coded in the router, which reduces flexibility in building and managing the tree. ...
arXiv:2102.00643v2
fatcat:izxi645kozdc5ibfsqp2y2foau
Proposal for a Standard Format for Neurophysiology Data Recording and Exchange
2016
Journal of clinical neurophysiology
The lack of interoperability between information networks is a significant source of cost in healthcare. ...
parallel processing; (3) efficient and flexible lossy or lossless data compression; (4) industry standard multi-layered data encryption and time obfuscation which permits sharing of human data without ...
In keeping with this requirement, care has been taken with the MEF3 library code to maintain thread safety, meaning that the code only manipulates the format data structures in a manner that guarantees ...
doi:10.1097/wnp.0000000000000257
pmid:26808620
pmcid:PMC4956586
fatcat:wrqakcpjhbe5vhebcxqpmumkae
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
2013
IOSR Journal of Computer Engineering
These OSNs provides digital social interactions and social as well as personal information sharing, but in sharing a number of security and privacy problems raised. ...
To this end, we propose an approach to enable the protection of shared data associated with multiple users in OSNs. ...
In case a requestor sends the obfuscated data package to a third party the same process, described above, applies. ...
doi:10.9790/0661-1320107
fatcat:rdpsdcqelbbzvkg5rm4og4tzba
An Empirical Study on System Level Aspects of Internet of Things (IoT)
2020
IEEE Access
This condition usually occurs when there is a rebooting and no idea on about state of the receiving node. The code represents the message type of the request and response messages. ...
The RTPS message format is shown in Figure 25 (A), and it consists of a leading header and a variable number of sub-messages. ...
doi:10.1109/access.2020.3029847
fatcat:5nprx4xtbjfnnkyibk6vbeg47m
Wireless Sensor Network Security
2013
International Journal of Distributed Sensor Networks
The information in this document reflects only the author's views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose. ...
Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section ...
Encryption and Authentication TinySec uses a block cipher algorithm for its encryption scheme that is also used for the message authentication code (MAC) resulting in greater code efficiency. ...
doi:10.1155/2013/362385
fatcat:2ph46uukonbtbdkc5q6t4mvgcq
Sensor Networks for High-Confidence Cyber-Physical Systems
2011
International Journal of Distributed Sensor Networks
., cyber-physical coupling driven by new demands and applications) give rise to a lot of open challenges for design and deployment of sensor networks in such systems. ...
The performance of this algorithm is analyzed with a number of simulations based on data set obtained in urban roadway. ...
Acknowledgments The work described in this paper was supported by a
Acknowledgments The authors would like to thank the reviewers for their detailed comments that have helped to improve the quality ...
doi:10.1155/2011/245734
fatcat:lswungc2orda5pcqvpyqu7vrna
Evil Offspring - Ransomware and Crypto Technology
2016
IEEE Internet Computing
message, ransomware can avoid the reliance on a single public key. ...
., Suite 320, Rockville, MD 20850 (Attn: A. Jindal). ...
A Ph.D. in computer science or a closely related area is required. ...
doi:10.1109/mic.2016.90
fatcat:v5zmzx7qrba5dkqxweoo3ifvry
A topological data analytic approach for discovering biophysical signatures in protein dynamics
2022
PLoS Computational Biology
Algorithmically, SINATRA Pro works by first taking in the 3D atomic coordinates for each protein snapshot and summarizing them according to their underlying topology. ...
These results highlight SINATRA Pro as a promising method for facilitating the non-trivial task of pattern recognition in trajectories resulting from molecular dynamics simulations, with substantially ...
Acknowledgments A majority of this research was conducted using computational resources and services at the Center for Computation and Visualization (CCV), Brown University. ...
doi:10.1371/journal.pcbi.1010045
pmid:35500014
pmcid:PMC9098046
fatcat:fmkw26c4sndd3a5o7ewifern2u
Enterprise Tools for Data Forensics
[chapter]
2021
DAAAM Proceedings
These can be applied for different functions in the forensic processes. Competencies and knowledge are often outsourced in most organizations. ...
There will always be a demand for data forensics procedures, and it will only increase as IT develops. ...
MD5) is used in digital forensics. It creates 128-bit message digests and is free to use. • Secure hash algorithm (SHA-0. SHA-1, SHA-224, SHA-256, SHA-384, SHA-512). ...
doi:10.2507/32nd.daaam.proceedings.014
fatcat:3lez6ca4czdarew5xuuht6o3pe
From the Web of Data to a World of Action
2010
Social Science Research Network
t, and a prototype desktop application On Time, and the paper discusses how the components could be more fully, yet more openly, linked in terms of both architecture and interaction. ...
; spreading activation over personal ontologies, to allow modelling of context; algorithms for automatically inferring 'typing' of web-form input data based on previous user inputs; and early work on inferring ...
This has influenced algorithm design throughout. For example, in Snip!t, the use of triggered recognisers was partly driven by this consideration. ...
doi:10.2139/ssrn.3199492
fatcat:l4yxdle47zfdfc4tguhsmnh72e
« Previous
Showing results 1 — 15 out of 173 results