Sciweavers

636 search results - page 64 / 128
» Computational Engineering and Science Program at the Univers...
Sort
View
PLDI
2005
ACM
14 years 1 months ago
Jungloid mining: helping to navigate the API jungle
Reuse of existing code from class libraries and frameworks is often difficult because APIs are complex and the client code required to use the APIs can be hard to write. We obser...
David Mandelin, Lin Xu, Rastislav Bodík, Do...
ENTCS
2010
88views more  ENTCS 2010»
13 years 5 months ago
Range and Set Abstraction using SAT
d Set Abstraction using SAT Edd Barrett Andy King School of Computing, University of Kent, CT2 7NF, UK Symbolic decision trees are not the only way to correlate the relationship b...
Edd Barrett, Andy King
CN
2006
109views more  CN 2006»
13 years 8 months ago
Quality of service provisioning for composable routing elements
Quality of service (QoS) provisioning for dynamically composable software elements in a programmable router has not received much attention. We present a router platform that supp...
Seung Chul Han, Puneet Zaroo, David K. Y. Yau, Yu ...
CCS
2008
ACM
13 years 10 months ago
Black-box accountable authority identity-based encryption
A well-known concern in the setting of identity based encryption is that the PKG is all powerful and has to be completely trusted. To mitigate this problem, the notion of Accounta...
Vipul Goyal, Steve Lu, Amit Sahai, Brent Waters
IPSN
2010
Springer
13 years 9 months ago
Real-time burst event detection in water distribution systems
tract: Real-time Burst Event Detection in Water Distribution Systems Seshan Srirangarajan 1 , Mudasser Iqbal 1 , Michael Allen 2 , Ami Preis 2 , Cheng Fu 1 , Lewis Girod 3 , Kai-Ju...
Seshan Srirangarajan, Mudasser Iqbal, Michael Alle...