Sciweavers

79 search results - page 12 / 16
» Computational criticisms of the revelation principle
Sort
View
ICSE
2005
IEEE-ACM
14 years 7 months ago
Informatics: A Novel, Contextualized Approach to Software Engineering Education
Over the past decade, it has been established that a good education in software engineering requires a specialized program of study different from traditional computer science prog...
André van der Hoek, David G. Kay, Debra J. ...
AICCSA
2006
IEEE
143views Hardware» more  AICCSA 2006»
14 years 1 months ago
An Innovative Self-Configuration Approach for Networked Systems and Applications
The increased complexity, heterogeneity and the dynamism of networked systems and services make current control and management tools to be ineffective in managing and securing suc...
Huoping Chen, Salim Hariri, Fahd Rasul
DRM
2004
Springer
14 years 27 days ago
Tamper detection and localization for categorical data using fragile watermarks
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In...
Yingjiu Li, Huiping Guo, Sushil Jajodia
FTDB
2007
95views more  FTDB 2007»
13 years 7 months ago
Architecture of a Database System
Database Management Systems (DBMSs) are a ubiquitous and critical component of modern computing, and the result of decades of research and development in both academia and industr...
Joseph M. Hellerstein, Michael Stonebraker, James ...
RTS
2006
115views more  RTS 2006»
13 years 7 months ago
Resource access control for dynamic priority distributed real-time systems
Many of today's complex computer applications are being modeled and constructed using the principles inherent to real-time distributed object systems. In response to this dem...
Chen Zhang, David Cordes