Sciweavers

5623 search results - page 1080 / 1125
» Incremental Mechanism Design
Sort
View
EUROSYS
2009
ACM
15 years 7 months ago
Effective and efficient compromise recovery for weakly consistent replication
Weakly consistent replication of data has become increasingly important both for loosely-coupled collections of personal devices and for large-scale infrastructure services. Unfor...
Prince Mahajan, Ramakrishna Kotla, Catherine C. Ma...
GI
2009
Springer
15 years 7 months ago
An Eclipse Framework for Rapid Development of Rich-featured GEF Editors based on EMF Models
Abstract: Model-based development has an increasing importance in modern software engineering and other domains. Visual models such as Petri nets and UML diagrams proved to be an a...
Tony Modica, Enrico Biermann, Claudia Ermel
ICC
2007
IEEE
170views Communications» more  ICC 2007»
15 years 7 months ago
Adaptive Power Loading for OFDM-Based Cognitive Radio Systems
Abstract--Cognitive radio (CR) technology is an innovative radio design philosophy which aims to increase spectrum utilization by exploiting unused spectrum in dynamically changing...
Gaurav Bansal, Md. Jahangir Hossain, Vijay K. Bhar...
ACNS
2004
Springer
85views Cryptology» more  ACNS 2004»
15 years 7 months ago
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to hig...
Michael E. Locasto, Angelos D. Keromytis
ACSAC
2004
IEEE
15 years 7 months ago
Tracing the Root of "Rootable" Processes
In most existing systems, the authorization check for system resource access is based on the user ID of the running processes. Such systems are vulnerable to password stealing/cra...
Amit Purohit, Vishnu Navda, Tzi-cker Chiueh
« Prev « First page 1080 / 1125 Last » Next »