Sciweavers

59 search results - page 7 / 12
» Hazard-Free Connection Release
Sort
View
CORR
2011
Springer
199views Education» more  CORR 2011»
13 years 10 days ago
Surrogate Parenthood: Protected and Informative Graphs
Many applications, including provenance and some analyses of social networks, require path-based queries over graphstructured data. When these graphs contain sensitive information...
Barbara T. Blaustein, Adriane Chapman, Len Seligma...
ICALP
2009
Springer
14 years 8 months ago
Secure Function Collection with Sublinear Storage
Consider a center possessing a trusted (tamper proof) device that wishes to securely compute a public function over private inputs that are contributed by some network nodes. In ne...
Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong...
ICSE
1999
IEEE-ACM
14 years 25 days ago
A Cooperative Approach to Support Software Deployment Using the Software Dock
Software deployment is an evolving collection of interrelated processes such as release, install, adapt, reconfigure, update, activate, deactivate, remove, and retire. The connect...
Richard S. Hall, Dennis Heimbigner, Alexander L. W...
ASPDAC
2006
ACM
141views Hardware» more  ASPDAC 2006»
14 years 9 days ago
Depth-driven verification of simultaneous interfaces
The verification of modern computing systems has grown to dominate the cost of system design, often with limited success as designs continue to be released with latent bugs. This t...
Ilya Wagner, Valeria Bertacco, Todd M. Austin
JNCA
2008
103views more  JNCA 2008»
13 years 8 months ago
Congestion control of bluetooth radio system by piconet restructuring
Bluetooth is a low-cost and short-range wireless communication technology. Two or more bluetooth devices connected form a piconet and two or more piconets connected form a scatter...
Gwo-Jong Yu, Chih-Yung Chang