Chen Hao

Results: 64



#Item
11

Weaknesses in Ring-LWE joint with (Yara Elias, Kristin E. Lauter, and Ekin Ozman) and (Hao Chen and Kristin E. Lauter)

Add to Reading List

Source URL: math.colorado.edu

- Date: 2016-04-13 17:47:48
    12Mathematics / Logic / Mathematical logic / Type theory / Automated theorem proving / Logic programming / Logical truth / Propositional calculus / Substitution / Symbol / Tuple

    A Program Logic for Verifying Secure Routing Protocols Chen Chen1 , Limin Jia2 , Hao Xu1 , Cheng Luo1 , Wenchao Zhou3 , and Boon Thau Loo1 1

    Add to Reading List

    Source URL: www.andrew.cmu.edu

    Language: English - Date: 2016-01-24 20:37:43
    13Classes of computers / Personal computing / Laptop / Lenovo / Tablet computer / Liquid-crystal display / Page orientation / ThinkPad

    Proposal on a Dual-side Viewable Display System Huaijin Chen, Imaging Science / MIS Hao Shi, Physics / Mechanical Engineering Advisor: Dr. Carl Salvaggio Introduction

    Add to Reading List

    Source URL: hc25.web.rice.edu

    Language: English - Date: 2011-02-08 23:08:31
    14Symbol / Tuple / First-order logic / IP / Substitution / Operator

    A Program Logic for Verifying Secure Routing Protocols (Technical Report) Chen Chen1 , Limin Jia2 , Hao Xu1 , Cheng Luo1 , Wenchao Zhou3 , and Boon Thau Loo1 1

    Add to Reading List

    Source URL: www.andrew.cmu.edu

    Language: English - Date: 2016-01-24 20:37:43
    15Unix / System administration / User identifier / Group identifier / Setuid / System calls / Principle of least privilege / Privilege separation / Su / Capability-based security / Kernel / File system permissions

    Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

    Add to Reading List

    Source URL: www.unixwiz.net

    Language: English - Date: 2014-08-03 23:18:45
    16Algebraic number theory / Finite fields / Ring Learning with Errors / Galois theory / Field theory / Algebraic number field / Distribution / Frobenius endomorphism / XTR / Ring learning with errors key exchange

    Vulnerable Galois RLWE Families and Improved Attacks Hao Chen, Kristin E. Lauter, Katherine E. Stange 1. Introduction Lattice-based cryptography was introduced in the mid 1990s in two different forms, independently by Aj

    Add to Reading List

    Source URL: math.colorado.edu

    Language: English - Date: 2016-02-24 10:14:48
    17Virtual memory / Memory management / Computer memory / Computer architecture / Cache / CPU cache / Paging / Page table / Random-access memory / Memory management unit / Page fault / Mmap

    “Anti-Caching”-based Elastic Memory Management for Big Data Hao Zhang # , Gang Chen †‡ , Beng Chin Ooi # , Weng-Fai Wong # Shensen Wu †‡ , Yubin Xia ∗ # †

    Add to Reading List

    Source URL: www.comp.nus.edu.sg

    Language: English - Date: 2014-12-02 06:59:06
    18Structured storage / Cross-platform software / NoSQL / Distributed computing architecture / Database caching / Memcached / Redis / Apache Spark / Key-value database / Scalability / Database / Redis Labs

    Efficient In-memory Data Management: An Analysis Hao Zhang† , Bogdan Marius Tudor† , Gang Chen# , Beng Chin Ooi† † † National University of Singapore, # Zhejiang University

    Add to Reading List

    Source URL: www.comp.nus.edu.sg

    Language: English - Date: 2014-05-19 11:59:33
    19Biological databases / Finite automata / Trie / Database / PubMed / Internet search engines

    Seaform: Search-As-You-Type in Forms Hao Wu † Guoliang Li ‡ Chen Li §

    Add to Reading List

    Source URL: www.comp.nus.edu.sg

    Language: English - Date: 2010-09-22 03:53:30
    20

    From Co-saliency Detection to Object Co-segmentation: a Unified Multi-stage Low-rank Matrix Recovery Approach Hao Chen, Panbing Wang, Ming Liu*  Abstract—Object co-segmentation aims to identify and

    Add to Reading List

    Source URL: www.ram-lab.com

    Language: English - Date: 2015-12-19 11:23:47
      UPDATE