CWI

Displaying 1 - 5 of 5 results

  • SciBORQ: Scientific Data Management With Bounds On Runtime and Quality

    White Papers // Jan 2011 // provided by CWI

    Data warehouses underlying virtual observatories stress the capabilities of database management systems in many ways. They are filled, on a daily basis, with large amounts of factual information derived from intensive data scrubbing and computational feature extraction pipelines. The predominant data processing techniques focus on parallel loads and map-reduce feature ...

    Download Now
  • Generic Database Cost Models for Hierarchical Memory Systems

    White Papers // Jan 2011 // provided by CWI

    Accurate prediction of operator execution time is a prerequisite for database query optimization. Although extensively studied for conventional disk-based DBMSs, cost modeling in main-memory DBMSs is still an open issue. Recent database research has demonstrated that memory access is more and more becoming a significant - if not the major ...

    Download Now
  • Database Architecture Optimized for the New Bottleneck: Memory Access

    White Papers // Jan 2011 // provided by CWI

    In the past decade, advances in speed of commodity CPUs have far out-paced advances in memory latency. Main-memory access is therefore increasingly a performance bottleneck for many computer applications, including database systems. In this paper, the authors use a simple scan test to show the severe impact of this bottleneck. ...

    Download Now
  • Secure Hybrid Encryption from Weakened Key Encapsulation

    White Papers // Jun 2007 // provided by CWI

    The authors put forward a new paradigm for building hybrid encryption schemes from Constrained Chosen-Ciphertext Attack secure (CCCA) Key-Encapsulation Mechanisms (KEMs) plus authenticated symmetric encryption. Constrained chosen-ciphertext security is a new security notion for KEMs that they propose. It has less demanding security requirements than standard CCCA security (since it ...

    Download Now
  • Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman

    White Papers // Feb 2007 // provided by CWI

    One of the main fields of interest in cryptography is the design and the analysis of the security of encryption schemes in the Public-Key Encryption setting (PKE schemes). The authors propose a practical key encapsulation mechanism with a simple and intuitive design concept. Security against chosen-ciphertext attacks can be proved ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?