Sciweavers

35419 search results - page 195 / 7084
» How are we doing
Sort
View
ADBIS
2010
Springer
181views Database» more  ADBIS 2010»
15 years 6 months ago
Stones Falling in Water: When and How to Restructure a View-Based Relational Database
Nowadays, one of the most important problems of software engineering continues to be the maintenance of both databases and applications. It is clear that any method that can reduce...
Eladio Domínguez, Jorge Lloret, Angel Luis ...
USENIX
2000
15 years 5 months ago
MOSIX: How Linux Clusters Solve Real-World Problems
As the complexity of software increases, the size of the software tends to increase as well, which incurs longer compilation and build cycles. In this paper, the authors present o...
Steve McClure, Richard Wheeler
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 4 months ago
How to prevent type-flaw attacks on security protocols under algebraic properties
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Sreekanth Malladi, Pascal Lafourcade
COMGEO
2004
ACM
15 years 4 months ago
How to draw the minimum cuts of a planar graph
We show how to utilize the cactus representation of all minimum cuts of a graph to visualize the minimum cuts of a planar graph in a planar drawing. In a first approach the cactus...
Ulrik Brandes, Sabine Cornelsen, Christian Fie&szl...
ACMACE
2010
ACM
14 years 11 months ago
How does Facebook browsing affect self-awareness and social well-being: the role of narcissism
Social networking sites such as Facebook have become extremely popular recently. In this research, we studied how Facebook browsing affects self-awareness and social well-being. O...
Lin Qiu, Han Lin, Angela Ka-yee Leung