Sciweavers

492 search results - page 86 / 99
» Encrypted Shared Data Spaces
Sort
View
HICSS
2003
IEEE
128views Biometrics» more  HICSS 2003»
14 years 27 days ago
Developing a Community Vision: The Case of a Regional United Way
This paper provides descriptive research about a successful collaborative vision development process undertaken for a regional United Way. The entire process from learning about t...
Bradd C. Hayes
SRDS
2003
IEEE
14 years 26 days ago
Transparent Runtime Randomization for Security
A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes Transparent Runtime Randomization (TRR), a general...
Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer
GCC
2003
Springer
14 years 24 days ago
Dominating-Set-Based Searching in Peer-to-Peer Networks
— The peer-to-peer network for sharing information and data through direct exchange has emerged rapidly in recent years. The searching problem is a basic issue that addresses the...
Chunlin Yang, Jie Wu
ISSS
2000
IEEE
127views Hardware» more  ISSS 2000»
13 years 12 months ago
Lower Bound Estimation for Low Power High-Level Synthesis
This paper addresses the problem of estimating lower bounds on the power consumption in scheduled data flow graphs with a fixed number of allocated resources prior to binding. T...
Lars Kruse, Eike Schmidt, Gerd Jochens, Ansgar Sta...
APN
1999
Springer
13 years 12 months ago
Parallel Approaches to the Numerical Transient Analysis of Stochastic Reward Nets
Abstract. This paper presents parallel approaches to the complete transient numerical analysis of stochastic reward nets (SRNs) for both shared and distributed-memory machines. Par...
Susann C. Allmaier, David Kreische