Sciweavers

663 search results - page 6 / 133
» PKI design for the real world
Sort
View
SIGMOD
2010
ACM
321views Database» more  SIGMOD 2010»
14 years 8 days ago
HadoopDB in action: building real world applications
HadoopDB is a hybrid of MapReduce and DBMS technologies, designed to meet the growing demand of analyzing massive datasets on very large clusters of machines. Our previous work ha...
Azza Abouzied, Kamil Bajda-Pawlikowski, Jiewen Hua...
ASPLOS
2008
ACM
13 years 9 months ago
Learning from mistakes: a comprehensive study on real world concurrency bug characteristics
The reality of multi-core hardware has made concurrent programs pervasive. Unfortunately, writing correct concurrent programs is difficult. Addressing this challenge requires adva...
Shan Lu, Soyeon Park, Eunsoo Seo, Yuanyuan Zhou
HRI
2011
ACM
12 years 11 months ago
A robotic game to evaluate interfaces used to show and teach visual objects to a robot in real world condition
In this paper, we present a real world user study of 4 interfaces designed to teach new visual objects to a social robot. This study was designed as a robotic game in order to mai...
Pierre Rouanet, Fabien Danieau, Pierre-Yves Oudeye...
SEMCO
2007
IEEE
14 years 1 months ago
Thematic Role Based Generation of UML Models from Real World Requirements
Model-driven development depends on good initial models. Creating these models by hand is a challenging task, because of complex specification documents and change requests. We p...
Tom Gelhausen, Walter F. Tichy
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
14 years 1 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang