Sciweavers

24529 search results - page 4819 / 4906
» Computing on Authenticated Data
Sort
View
POPL
1998
ACM
14 years 2 months ago
From System F to Typed Assembly Language
abstractions, such as closures, tuples, and user-defined abstract data types. The type system ensures that well-typed programs cannot violate these abstractions. In addition, the ...
J. Gregory Morrisett, David Walker, Karl Crary, Ne...
SIGCOMM
1998
ACM
14 years 2 months ago
The MASC/BGMP Architecture for Inter-Domain Multicast Routing
Multicast routing enables e cient data distribution to multiple recipients. However, existing work has concentrated on extending single-domain techniques to wide-area networks, ra...
Satish Kumar, Pavlin Radoslavov, David Thaler, Cen...
COMPSAC
1997
IEEE
14 years 2 months ago
Classifying Architectural Elements as a Foundation for Mechanism Matching
Building a system at the architectural level can be thought of as decomposition into components followed by a series of exercises in matching. Components must be composed with eac...
Rick Kazman, Paul C. Clements, Leonard J. Bass, Gr...
MICCAI
1998
Springer
14 years 2 months ago
Motion Measurements in Low-Contrast X-ray Imagery
Measuring motion in medical imagery becomes more and more important, in particular for object tracking, image registration, and local displacement measurements. Often, the require...
Martin Berger, Guido Gerig
VLDB
1998
ACM
192views Database» more  VLDB 1998»
14 years 2 months ago
Algorithms for Mining Distance-Based Outliers in Large Datasets
This paper deals with finding outliers (exceptions) in large, multidimensional datasets. The identification of outliers can lead to the discovery of truly unexpected knowledge in ...
Edwin M. Knorr, Raymond T. Ng
« Prev « First page 4819 / 4906 Last » Next »