Sciweavers

940 search results - page 83 / 188
» A Perspective of Generative Reuse
Sort
View
SIGMOD
2005
ACM
118views Database» more  SIGMOD 2005»
14 years 9 months ago
A survey of data provenance in e-science
Data management is growing in complexity as largescale applications take advantage of the loosely coupled resources brought together by grid middleware and by abundant storage cap...
Yogesh Simmhan, Beth Plale, Dennis Gannon
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
14 years 3 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
ASPDAC
2009
ACM
111views Hardware» more  ASPDAC 2009»
14 years 3 months ago
A UML-based approach for heterogeneous IP integration
- With increasing availability of predefined IP (Intellectual Properties) blocks and inexpensive microprocessors, embedded system designers are faced with more design choices than ...
Zhenxin Sun, Weng-Fai Wong
ICCCN
2007
IEEE
14 years 3 months ago
Maintaining Routing Tree in IEEE 802.16 Centralized Scheduling Mesh Networks
Abstract— The IEEE 802.16 mesh mode supports two scheduling mechanisms, namely centralized scheduling and distributed scheduling. Centralized scheduling is based on a routing tre...
Yanbin Lu, Guoqing Zhang
ECTEL
2007
Springer
14 years 3 months ago
Community Tools for Repurposing Learning Objects
A critical success factor for the reuse of learning objects is the ease by which they may be repurposed in order to enable reusability in a different teaching context from which th...
Chu Wang, Kate Dickens, Hugh C. Davis, Gary Wills