Sciweavers

2013 search results - page 320 / 403
» Analysis and Design Techniques for Service-Oriented Developm...
Sort
View
SIGMOD
2007
ACM
144views Database» more  SIGMOD 2007»
14 years 8 months ago
GhostDB: querying visible and hidden data without leaks
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Phil...
ESORICS
2007
Springer
14 years 2 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
ICRA
2005
IEEE
164views Robotics» more  ICRA 2005»
14 years 1 months ago
Active Control of Configuration-Dependent Linkage Vibration with Application to a Planar Parallel Platform
—A new lightweight planar parallel platform aims to greatly improve operational speed of electronic manufacturing process and to realize a “smart parallel platform” through t...
Xiaoyun Wang, James K. Mills
ISSTA
2004
ACM
14 years 1 months ago
Model checking XML manipulating software
The use of XML as the de facto data exchange standard has allowed integration of heterogeneous web based software systems regardless of implementation platforms and programming la...
Xiang Fu, Tevfik Bultan, Jianwen Su
HIPC
2003
Springer
14 years 1 months ago
Double-Loop Feedback-Based Scheduling Approach for Distributed Real-Time Systems
The use of feedback control techniques has been gaining importance in real-time scheduling as a means to provide predictable performance in the face of uncertain workload. In this ...
Suzhen Lin, G. Manimaran