Search

Your search keyword '"Block (data storage)"' showing total 1,389 results

Search Constraints

Start Over You searched for: Descriptor "Block (data storage)" Remove constraint Descriptor: "Block (data storage)" Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
1,389 results on '"Block (data storage)"'

Search Results

1. Big data simulations for capacity improvement in a general ophthalmology clinic

2. Development of nonlinear finite element models of mortar-free interlocked single block column subjected to lateral loading

3. Instant Block Confirmation in the Sleepy Model

4. Congestion Attacks in Payment Channel Networks

5. Fraud and Data Availability Proofs: Detecting Invalid Blocks in Light Clients

6. Under the Hood of the Ethereum Gossip Protocol

7. Ignore the Extra Zeroes: Variance-Optimal Mining Pools

8. PoSAT: Proof-of-Work Availability and Unpredictability, Without the Work

9. Wireless Industrial Networks for Real-Time Applications

10. Selfish Mining Attacks Exacerbated by Elastic Hash Supply

11. HaPPY-Mine: Designing a Mining Reward Function

12. ACeD: Scalable Data Availability Oracle

13. Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments

14. Deployment architecture for the local delivery of ML-Models to the industrial shop floor

15. A robust potential-based contact force solution approach for discontinuous deformation analysis of irregular convex polygonal block/particle systems

16. Development of a Solids Conveying Throughput Model for Grooved Barrel Extruders Based on Discrete Element Simulations

17. Deep Residual SENet for Foliage Recognition

18. DPNet: A Dual Path Network for Road Scene Semantic Segmentation

19. Mechanical characterization on structural element level

20. Incremental Train Control System of Qinghai–Tibet Railway

21. Analysis of the Bitcoin UTXO Set

22. Towards Everlasting Privacy and Efficient Coercion Resistance in Remote Electronic Voting

23. Not So Predictable Mining Pools: Attacking Solo Mining Pools by Bagging Blocks and Conning Competitors

24. Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions

25. Video Watermarking Based on DPCM and Transformcoding Using Permutation Spectrum and QIM

26. Adaptive Multiscale Block Compressed Sensing with Texture Information and Orientation Estimation

27. CPA-BAM: Block-Abstraction Memoization with Value Analysis and Predicate Analysis

28. Mitigating SAT Attack on Logic Locking

29. Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers

30. New Insights on AES-Like SPN Ciphers

31. Improved OR-Composition of Sigma-Protocols

32. A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not

33. Implementation of Power off Recovery Scheme for Block Mapping FTL

34. Content Awareness-Based Fast Block Motion Estimation Algorithm for H.264/AVC Encoding System

35. Cache-Oblivious Sorting

36. Urban Railway Operation Plan Subject to Disruption

37. Consumption Estimating Model of the Frame Shear Wall Structure Materials

38. Efficient Indexing for OLAP Query Processing with MapReduce

39. Residual Histogram Shifting Technique Based on Cascading Prediction for Reversible Data Hiding

40. Visual Tracking via Structure Rearrangement and Multi-scale Block Appearance Model

41. An Image Encryption Algorithm Based on Chua’s Chaos and Baker’s Transformation

42. Collision Attack on 5 Rounds of Grøstl

43. Secure High-Rate Transaction Processing in Bitcoin

44. Fusion of Contour Feature and Edge Texture Information for Palmprint Recognition

45. A Clustering Approach for Detecting Auto-generated Botnet Domains

46. Optimally Secure Block Ciphers from Ideal Primitives

47. Inclusive Block Chain Protocols

48. Simulation Study of General Cargo Yard Layout

49. Find Behaviors of Network Evasion and Protocol Obfuscation Using Traffic Measurement

50. Discover Abnormal Behaviors Using HTTP Header Fields Measurement

Catalog

Books, media, physical & digital resources