Sciweavers

1790 search results - page 277 / 358
» On Privacy Models for RFID
Sort
View
123
Voted
RE
2006
Springer
15 years 3 months ago
Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations
In the United States, federal and state regulations prescribe stakeholder rights and obligations that must be satisfied by the requirements for software systems. These regulations ...
Travis D. Breaux, Matthew W. Vail, Annie I. Ant&oa...
155
Voted
ISI
2002
Springer
15 years 3 months ago
Getting right answers from incomplete multidimensional databases
Dealing with large volumes of data, OLAP data cubes aggregated values are often spoiled by errors due to missing values in detailed data. This paper suggests to adjust aggregate an...
Sabine Goutier, Georges Hébrail, Vér...
127
Voted
SP
2002
IEEE
140views Security Privacy» more  SP 2002»
15 years 3 months ago
Efficient Multicast Packet Authentication Using Signature Amortization
We describe a novel method for authenticating multicast packets that is robust against packet loss. Our main focus is to minimize the size of the communication overhead required t...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
123
Voted
OOPSLA
2010
Springer
15 years 1 months ago
Instrumentation and sampling strategies for cooperative concurrency bug isolation
Fixing concurrency bugs (or crugs) is critical in modern software systems. Static analyses to find crugs such as data races and atomicity violations scale poorly, while dynamic a...
Guoliang Jin, Aditya V. Thakur, Ben Liblit, Shan L...
114
Voted
OOPSLA
2010
Springer
15 years 1 months ago
Back to the futures: incremental parallelization of existing sequential runtime systems
Many language implementations, particularly for high-level and scripting languages, are based on carefully honed runtime systems that have an internally sequential execution model...
James Swaine, Kevin Tew, Peter A. Dinda, Robert Br...