Sciweavers

619 search results - page 87 / 124
» Learning with Security
Sort
View
NDSS
2009
IEEE
14 years 3 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
DAWAK
2007
Springer
14 years 3 months ago
Computing Join Aggregates over Private Tables
We propose a privacy-preserving protocol for computing aggregation queries over the join of private tables. In this problem, several parties wish to share aggregated information ov...
Rong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu
ICDCSW
2005
IEEE
14 years 2 months ago
Performing BGP Experiments on a Semi-realistic Internet Testbed Environment
We have built a router testbed that is connected to the Deter/Emist experimental infrastructure. Our goal is to create a semi-realistic testbed to conduct BGP experiments, measure...
Ke Zhang, Soon Tee Teoh, Shih-Ming Tseng, Rattapon...
OOPSLA
2005
Springer
14 years 2 months ago
Roles of variables in object-oriented programming
Roles can be assigned to occurrences of variables in programs according to a small number of stereotypical patterns of use. Studies on explicitly teaching roles to novices learnin...
Pauli Byckling, Petri Gerdt, Jorma Sajaniemi
OOPSLA
2004
Springer
14 years 2 months ago
An aspect-oriented generative approach
Generative programming and aspect-oriented software development have been proposed over the last years aiming at increasing maintainability and reusability of software systems. Wh...
Uirá Kulesza, Alessandro F. Garcia, Carlos ...