Sciweavers

1116 search results - page 179 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
WSC
1997
13 years 9 months ago
Petri Net Based Simulation of Construction Schedules
Scheduling of a construction project requires: a) hierarchical decomposition of the project; b) incorporation of risk and uncertainty in the activity time and cost estimates; and ...
Anil Sawhney
3DIM
2007
IEEE
14 years 2 months ago
Dense Depth and Color Acquisition of Repetitive Motions
Modeling dynamic scenes is a challenging problem faced by applications such as digital content generation and motion analysis. Fast single-frame methods obtain sparse depth sample...
Yi Xu, Daniel G. Aliaga
TCS
2010
13 years 6 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
ICAC
2005
IEEE
14 years 1 months ago
Feedback-based Scheduling for Back-end Databases in Shared Dynamic Content Server Clusters
This paper introduces a self-configuring architecture for scaling the database tier of dynamic content web servers. We use a unified approach to load and fault management based ...
Gokul Soundararajan, Kaloian Manassiev, Jin Chen, ...
OSDI
2000
ACM
13 years 9 months ago
Knit: Component Composition for Systems Software
Knit is a new component definition and linking language for systems code. Knit helps make C code more understandable and reusable by third parties, helps eliminate much of the per...
Alastair Reid, Matthew Flatt, Leigh Stoller, Jay L...