Sciweavers

2961 search results - page 373 / 593
» Optimization of tele-immersion codes
Sort
View
TCC
2009
Springer
141views Cryptology» more  TCC 2009»
16 years 4 months ago
Proofs of Retrievability via Hardness Amplification
Proofs of Retrievability (PoR), introduced by Juels and Kaliski [JK07], allow the client to store a file F on an untrusted server, and later run an efficient audit protocol in whi...
Yevgeniy Dodis, Salil P. Vadhan, Daniel Wichs
135
Voted
PLDI
1996
ACM
15 years 8 months ago
Realistic Compilation by Partial Evaluation
Two key steps in the compilation of strict functional languages are the conversion of higher-order functions to data structures (closures) and the transformation to tail-recursive...
Michael Sperber, Peter Thiemann
ICSR
2000
Springer
15 years 7 months ago
A New Control Structure for Transformation-Based Generators
A serious problem of most transformation-based generators is that they are trying to achieve three mutually antagonistic goals simultaneously: 1) deeply factored operators and oper...
Ted J. Biggerstaff
147
Voted
COOTS
1998
15 years 5 months ago
The Design and Performance of MedJava
The Java programming language has gained substantial popularity in the past two years. Java's networking features, along with the growing number of Web browsers that execute J...
Prashant Jain, Seth Widoff, Douglas C. Schmidt
170
Voted
TDSC
2010
218views more  TDSC 2010»
15 years 2 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...