Sciweavers

1045 search results - page 172 / 209
» The Use of Exceptions
Sort
View
SIGCOMM
1999
ACM
14 years 10 days ago
A Simple Approximation to Minimum-Delay Routing
The conventional approach to routing in computer networks consists of using a heuristic to compute a single shortest path from a source to a destination. Single-path routing is ve...
Srinivas Vutukury, J. J. Garcia-Luna-Aceves
ASPLOS
1998
ACM
14 years 8 days ago
Compiler-Controlled Memory
Optimizations aimed at reducing the impact of memory operations on execution speed have long concentrated on improving cache performance. These efforts achieve a reasonable level...
Keith D. Cooper, Timothy J. Harvey
AISC
1998
Springer
14 years 8 days ago
Reasoning About Coding Theory: The Benefits We Get from Computer Algebra
The use of computer algebra is usually considered beneficial for mechanised reasoning in mathematical domains. We present a case study, in the application domain of coding theory, ...
Clemens Ballarin, Lawrence C. Paulson
PET
2010
Springer
13 years 12 months ago
Private Information Disclosure from Web Searches
As the amount of personal information stored at remote service providers increases, so does the danger of data theft. When connections to remote services are made in the clear and ...
Claude Castelluccia, Emiliano De Cristofaro, Danie...
MICCAI
2000
Springer
13 years 11 months ago
Fixation-Based Surgery: A New Technique for Distal Radius Osteotomy
Abstract. Fixation-based surgery is a new technique for achieving difficult corrections in some orthopedic procedures. The method is premised on using a fixation device, such as a ...
H. Croitoru, Randy E. Ellis, Carolyn F. Small, Dav...