Sciweavers

1116 search results - page 185 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
ESOP
2006
Springer
13 years 11 months ago
A Typed Assembly Language for Confidentiality
Language-based information-flow analysis is promising in protecting data confidentiality. Although much work has been carried out in this area, relatively little has been done for ...
Dachuan Yu, Nayeem Islam
FIW
2007
123views Communications» more  FIW 2007»
13 years 9 months ago
Composing Features by Managing Inconsistent Requirements
Abstract. One approach to system development is to decompose the requirements into features and specify the individual features before composing them. A major limitation of deferri...
Robin C. Laney, Thein Than Tun, Michael Jackson, B...
ACST
2006
13 years 9 months ago
A novel algorithm for synthesizing directional temporal texture animation
In this paper, we propose a novel algorithm for directional temporal texture synthesis. The generated temporal textures can move in any user-specified direction at run time, while...
Chao-Hung Lai, Jiunn-Lin Wu
ISCAPDCS
2001
13 years 9 months ago
AMOS-SDDS: A Scalable Distributed Data Manager for Windows Multicomputers
Known parallel DBMS offer at present only static partitioning schemes. Adding a storage node is then a cumbersome operation that typically requires the manual data redistribution....
Yakham Ndiaye, Aly Wane Diene, Witold Litwin, Tore...
WSC
1997
13 years 9 months ago
A Simulation-Based Backward Planning Approach for Order-Release
The problem of order release planning for a make-toorder production facility is addressed. Traditionally, order-release planning in a multi-stage shop is performed with material r...
Edward F. Watson, Deborah J. Medeiros, Randall P. ...