Sciweavers

28 search results - page 4 / 6
» A Passive Test Oracle Using a Component's API
Sort
View
IASTEDSEA
2004
13 years 8 months ago
An object oriented approach to an identity based encryption cryptosystem
We describe an object oriented approach to developing an Identity Based Encryption system. We show how an existing API was reused and extended to facilitate our development of the...
Adam Duffy, Tom Dowling
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 1 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
ADBIS
2007
Springer
74views Database» more  ADBIS 2007»
14 years 1 months ago
Preventing Orphan Requests by Integrating Replication and Transactions
Replication is crucial to achieve high availability distributed systems. However, non-determinism introduces consistency problems between replicas. Transactions are very well suite...
Heine Kolltveit, Svein-Olaf Hvasshovd

Book
338views
15 years 4 months ago
The Data Conversion Handbook
"The Data Conversion Handbook, edited by Walt Kester (Newnes, 2005), is written for design engineers who routinely use data converters and related circuitry. Comprising Data C...
Walt Kester
WWW
2009
ACM
14 years 8 months ago
Rapid development of spreadsheet-based web mashups
The rapid growth of social networking sites and web communities have motivated web sites to expose their APIs to external developers who create mashups by assembling existing func...
Woralak Kongdenfha, Boualem Benatallah, Julien Vay...