Sciweavers

26354 search results - page 148 / 5271
» How we refactor, and how we know it
Sort
View
HOTOS
2003
IEEE
14 years 3 months ago
Scheduling and Simulation: How to Upgrade Distributed Systems
Upgrading the software of long-lived distributed systems is difficult. It is not possible to upgrade all the nodes in a system at once, since some nodes may be down and halting t...
Sameer Ajmani, Barbara Liskov, Liuba Shrira
EUROCRYPT
2010
Springer
14 years 3 months ago
Bonsai Trees, or How to Delegate a Lattice Basis
We introduce a new lattice-based cryptographic structure called a bonsai tree, and use it to resolve some important open problems in the area. Applications of bonsai trees include...
David Cash, Dennis Hofheinz, Eike Kiltz, Chris Pei...
AI
2001
Springer
14 years 2 months ago
How AI Can Help SE; or: Randomized Search Not Considered Harmful
In fast-paced software projects, engineers don’t have the time or the resources to build heavyweight complete descriptions of their software. The best they can do is lightweight ...
Tim Menzies, Harshinder Singh
CSFW
2000
IEEE
14 years 2 months ago
How to Prevent Type Flaw Attacks on Security Protocols
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number o...
James Heather, Gavin Lowe, Steve Schneider
ADL
2000
Springer
276views Digital Library» more  ADL 2000»
14 years 2 months ago
Invading the Fortress: How to Besiege Reinforced Information Bunkers
Information retrieval (IR) research has been very active over the last decades to develop approaches that allow machine indexing to significantly improve indexing practice in lib...
Jeroen Hoppenbrouwers, Hans Paijmans