Sciweavers

1816 search results - page 194 / 364
» Trace oblivious computation
Sort
View
IPTPS
2003
Springer
15 years 8 months ago
Controlling the Cost of Reliability in Peer-to-Peer Overlays
Abstract—Structured peer-to-peer overlay networks provide a useful substrate for building distributed applications but there are general concerns over the cost of maintaining the...
Ratul Mahajan, Miguel Castro, Antony I. T. Rowstro...
152
Voted
HAPTICS
2010
IEEE
15 years 8 months ago
Laterotactile Rendering of Vector Graphics with the Stroke Pattern
Raised line patterns are used extensively in the design of tactile graphics for persons with visual impairments. A tactile stroke pattern was therefore developed to enable the rend...
Vincent Lévesque, Vincent Hayward
124
Voted
ISQED
2000
IEEE
117views Hardware» more  ISQED 2000»
15 years 7 months ago
Realistic Worst-Case Modeling by Performance Level Principal Component Analysis
A new algorithm to determine the number and value of realistic worst-case models for the performance of module library components is presented in this paper. The proposed algorith...
Alessandra Nardi, Andrea Neviani, Carlo Guardiani
EKAW
1999
Springer
15 years 7 months ago
Formally Verifying Dynamic Properties of Knowledge Based Systems
Abstract. In this paper we study dynamic properties of knowledge-based systems. We argue the importance of such dynamic properties for the construction and analysis of knowledge-ba...
Perry Groot, Annette ten Teije, Frank van Harmelen
117
Voted
ACSAC
1998
IEEE
15 years 7 months ago
Protecting Web Servers from Security Holes in Server-Side Includes
This paper first investigates and analyzes security holes concerning the use of Server-Side Includes (SSI) in some of the most used Web server software packages. We show that, by ...
Jared Karro, Jie Wang