Sciweavers

127 search results - page 6 / 26
» Call by Need Computations to Root-Stable Form
Sort
View
HT
2005
ACM
14 years 29 days ago
Hypervideo expression: experiences with hyper-hitchcock
Hyper-Hitchcock is a hypervideo editor enabling the direct manipulation authoring of a particular form of hypervideo called “detail-on-demand video.” This form of hypervideo a...
Frank M. Shipman III, Andreas Girgensohn, Lynn Wil...
AUSFORENSICS
2003
13 years 8 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
EUROPAR
2007
Springer
13 years 11 months ago
Domain-Specific Optimization Strategy for Skeleton Programs
Skeletal parallel programming enables us to develop parallel programs easily by composing ready-made components called skeletons. However, a simplycomposed skeleton program often l...
Kento Emoto, Kiminori Matsuzaki, Zhenjiang Hu, Mas...
FC
2007
Springer
125views Cryptology» more  FC 2007»
14 years 1 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
SIGMETRICS
2002
ACM
142views Hardware» more  SIGMETRICS 2002»
13 years 7 months ago
Probabilistic scalable P2P resource location services
Scalable resource discovery services form the core of directory and other middleware services. Scalability requirements preclude centralized solutions. The need to have directory ...
Daniel A. Menascé, Lavanya Kanchanapalli