Sciweavers

383 search results - page 26 / 77
» The Study of 3D-from-2D Using Elimination
Sort
View
INFOCOM
2000
IEEE
14 years 2 months ago
Message Stability Detection for Reliable Multicast
—Many scalable reliable multicast protocols use the local repair scheme where certain receivers retransmit packets by other receivers. Such schemes need a mechanism, called messa...
Katherine Guo, Injong Rhee
ICDCS
1998
IEEE
14 years 2 months ago
A Suite of Database Replication Protocols based on Group Communication Primitives
This paper proposes a family of replication protocols based on group communication in order to address some of the concerns expressed by database designers regarding existing repl...
Bettina Kemme, Gustavo Alonso
CCS
2008
ACM
13 years 12 months ago
Identity-based encryption with efficient revocation
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Public Key Infrastructure (PKI). Any setting, PKI- or identit...
Alexandra Boldyreva, Vipul Goyal, Virendra Kumar
ECOOP
2008
Springer
13 years 11 months ago
On Validity of Program Transformations in the Java Memory Model
Abstract. We analyse the validity of several common program transformations in multi-threaded Java, as defined by the Java Memory Model (JMM) section of Chapter 17 of the Java Lang...
Jaroslav Sevcík, David Aspinall
SPLC
2008
13 years 11 months ago
Automated Domain-Specific Modeling Languages for Generating Framework-Based Applications
The adoption of Domain-Specific Modeling Languages (DSMLs) for generating framework-based applications has proved to be an effective way of enforcing the correct use of frameworks...
André L. Santos, Kai Koskimies, Antó...