Sciweavers

1465 search results - page 126 / 293
» Data at work: supporting sharing in science and engineering
Sort
View
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
14 years 6 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
SOFTVIS
2003
ACM
14 years 2 months ago
3D Representations for Software Visualization
The paper presents a new 3D representation for visualizing large software systems. The origins of this representation can be directly traced to the SeeSoft metaphor. This work ext...
Andrian Marcus, Louis Feng, Jonathan I. Maletic
EUROSYS
2011
ACM
13 years 16 days ago
SRM-buffer: an OS buffer management technique to prevent last level cache from thrashing in multicores
Buffer caches in operating systems keep active file blocks in memory to reduce disk accesses. Related studies have been focused on how to minimize buffer misses and the caused pe...
Xiaoning Ding, Kaibo Wang, Xiaodong Zhang
ECHT
1992
14 years 1 months ago
SEPIA: A Cooperative Hypermedia Authoring Environment
In this paper, we report about the design, development, and implementation of the SEPIA cooperative hypermedia authoring environment. It provides results on the following aspects ...
Norbert A. Streitz, Jörg M. Haake, Jörg ...
BIRTHDAY
2007
Springer
14 years 1 months ago
Applying a Theorem Prover to the Verification of Optimistic Replication Algorithms
Abstract. The Operational Transformation (OT) approach is a technique for supporting optimistic replication in collaborative and mobile systems. It allows the users to concurrently...
Abdessamad Imine, Michaël Rusinowitch