Sciweavers

1166 search results - page 229 / 234
» Adaptively Secure Broadcast
Sort
View
GI
2004
Springer
14 years 3 months ago
Towards a Framework and a Design Methodology for Autonomic Integrated Systems
: The transition from microelectronics to nanoelectronics reaches physical limits and results in a paradigm shift in the design and fabrication of electronic circuits. The conserva...
Andreas Herkersdorf, Wolfgang Rosenstiel
ICCS
2003
Springer
14 years 3 months ago
visPerf: Monitoring Tool for Grid Computing
This paper describes a monitoring tool for grid computing[5], called visPerf. It is difficult to see the status of a working production grid system without a customized monitorin...
DongWoo Lee, Jack Dongarra, Rudrapatna S. Ramakris...
ICALP
2010
Springer
14 years 2 months ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao
OOPSLA
2009
Springer
14 years 2 months ago
Good examples for exposing bad practice: a "killer examples" workshop
The “Killer Examples” series of workshops are highly interactive workshops which have been an annual occurrence at OOPSLA since 2002. The goals of the workshop are to bring to...
Dale Skrien, Michael E. Caspersen, Jürgen B&o...
ICSE
2001
IEEE-ACM
14 years 2 months ago
Generating Wrappers for Command Line Programs: The Cal-Aggie Wrap-O-Matic Project
Software developers writing new software have strong incentives to make their products compliant to standards such as corba, com, and JavaBeans. Standardscompliance facilitates in...
Eric Wohlstadter, Stoney Jackson, Premkumar T. Dev...