Sciweavers

890 search results - page 152 / 178
» Programming language methods in computer security
Sort
View
ASPLOS
2011
ACM
13 years 3 days ago
Blink: managing server clusters on intermittent power
Reducing the energy footprint of data centers continues to receive significant attention due to both its financial and environmental impact. There are numerous methods that limi...
Navin Sharma, Sean Barker, David Irwin, Prashant J...
DATE
2005
IEEE
115views Hardware» more  DATE 2005»
14 years 2 months ago
Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach
— A novel power attack resistant cryptosystem is presented in this paper. Security in digital computing and communication is becoming increasingly important. Design techniques th...
Shengqi Yang, Wayne Wolf, Narayanan Vijaykrishnan,...

Book
231views
15 years 6 months ago
Object-Oriented Software Composition
"Object-Oriented Software Composition adopts the viewpoint that object-oriented technology is essentially about composing flexible software applications from software componen...
Oscar Nierstrasz, Dennis Tsichritzis
ICALP
2009
Springer
14 years 8 months ago
The Number of Symbol Comparisons in QuickSort and QuickSelect
Abstract We revisit the classical QuickSort and QuickSelect algorithms, under a complexity model that fully takes into account the elementary comparisons between symbols composing ...
Brigitte Vallée, James Allen Fill, Julien C...
CP
2009
Springer
14 years 3 months ago
Using Relaxations in Maximum Density Still Life
The Maximum Density Sill-Life Problem is to fill an n × n board of cells with the maximum number of live cells so that the board is stable under the rules of Conway’s Game of L...
Geoffrey Chu, Peter J. Stuckey, Maria Garcia de la...