CWI

Displaying 1-6 of 6 results

  • White Papers // Jan 2011

    SciBORQ: Scientific Data Management With Bounds On Runtime and Quality

    Data warehouses underlying virtual observatories stress the capabilities of database management systems in many ways. They are filled, on a daily basis, with large amounts of factual information derived from intensive data scrubbing and computational feature extraction pipelines. The predominant data processing techniques focus on parallel loads and map-reduce feature...

    Provided By CWI

  • White Papers // Jan 2011

    Generic Database Cost Models for Hierarchical Memory Systems

    Accurate prediction of operator execution time is a prerequisite for database query optimization. Although extensively studied for conventional disk-based DBMSs, cost modeling in main-memory DBMSs is still an open issue. Recent database research has demonstrated that memory access is more and more becoming a significant - if not the major...

    Provided By CWI

  • White Papers // Jan 2011

    Database Architecture Optimized for the New Bottleneck: Memory Access

    In the past decade, advances in speed of commodity CPUs have far out-paced advances in memory latency. Main-memory access is therefore increasingly a performance bottleneck for many computer applications, including database systems. In this paper, the authors use a simple scan test to show the severe impact of this bottleneck....

    Provided By CWI

  • White Papers // Jan 2010

    Performance Comparison of the Java Implementation of ATerms and XML

    ATerms are the ubiquitous data exchange format used in The Meta-Environment. ATerms were designed with a specific application domain in mind: exchanging parse tables, parse trees and other source code related data that emerges in the context of Interactive Development Environments and tools for source code analysis and transformation. World-wide,...

    Provided By CWI

  • White Papers // Jun 2007

    Secure Hybrid Encryption from Weakened Key Encapsulation

    The authors put forward a new paradigm for building hybrid encryption schemes from Constrained Chosen-Ciphertext Attack secure (CCCA) Key-Encapsulation Mechanisms (KEMs) plus authenticated symmetric encryption. Constrained chosen-ciphertext security is a new security notion for KEMs that they propose. It has less demanding security requirements than standard CCCA security (since it...

    Provided By CWI

  • White Papers // Feb 2007

    Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman

    One of the main fields of interest in cryptography is the design and the analysis of the security of encryption schemes in the Public-Key Encryption setting (PKE schemes). The authors propose a practical key encapsulation mechanism with a simple and intuitive design concept. Security against chosen-ciphertext attacks can be proved...

    Provided By CWI

  • White Papers // Jun 2007

    Secure Hybrid Encryption from Weakened Key Encapsulation

    The authors put forward a new paradigm for building hybrid encryption schemes from Constrained Chosen-Ciphertext Attack secure (CCCA) Key-Encapsulation Mechanisms (KEMs) plus authenticated symmetric encryption. Constrained chosen-ciphertext security is a new security notion for KEMs that they propose. It has less demanding security requirements than standard CCCA security (since it...

    Provided By CWI

  • White Papers // Feb 2007

    Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman

    One of the main fields of interest in cryptography is the design and the analysis of the security of encryption schemes in the Public-Key Encryption setting (PKE schemes). The authors propose a practical key encapsulation mechanism with a simple and intuitive design concept. Security against chosen-ciphertext attacks can be proved...

    Provided By CWI

  • White Papers // Jan 2010

    Performance Comparison of the Java Implementation of ATerms and XML

    ATerms are the ubiquitous data exchange format used in The Meta-Environment. ATerms were designed with a specific application domain in mind: exchanging parse tables, parse trees and other source code related data that emerges in the context of Interactive Development Environments and tools for source code analysis and transformation. World-wide,...

    Provided By CWI

  • White Papers // Jan 2011

    SciBORQ: Scientific Data Management With Bounds On Runtime and Quality

    Data warehouses underlying virtual observatories stress the capabilities of database management systems in many ways. They are filled, on a daily basis, with large amounts of factual information derived from intensive data scrubbing and computational feature extraction pipelines. The predominant data processing techniques focus on parallel loads and map-reduce feature...

    Provided By CWI

  • White Papers // Jan 2011

    Generic Database Cost Models for Hierarchical Memory Systems

    Accurate prediction of operator execution time is a prerequisite for database query optimization. Although extensively studied for conventional disk-based DBMSs, cost modeling in main-memory DBMSs is still an open issue. Recent database research has demonstrated that memory access is more and more becoming a significant - if not the major...

    Provided By CWI

  • White Papers // Jan 2011

    Database Architecture Optimized for the New Bottleneck: Memory Access

    In the past decade, advances in speed of commodity CPUs have far out-paced advances in memory latency. Main-memory access is therefore increasingly a performance bottleneck for many computer applications, including database systems. In this paper, the authors use a simple scan test to show the severe impact of this bottleneck....

    Provided By CWI