Sciweavers

785 search results - page 30 / 157
» Two remarks on remotality
Sort
View
TRUST
2010
Springer
14 years 2 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
WETICE
1997
IEEE
14 years 2 months ago
Reliability, Scalability and Robustness Issues in IRI*
Over the past two years, we have used the IRI (Interactive Remote Instruction) system to teach several live interactive classes with students in different cities. While this syste...
Ehab S. Al-Shaer, Alaa Youssef, Hussein M. Abdel-W...
ECOOP
2007
Springer
14 years 1 months ago
AS-GC: An Efficient Generational Garbage Collector for Java Application Servers
Abstract. A generational collection strategy utilizing a single nursery cannot efficiently manage objects in application servers due to variance in their lifespans. In this paper, ...
Feng Xian, Witawas Srisa-an, ChengHuan Jia, Hong J...
KBSE
2005
IEEE
14 years 3 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
ICIP
2002
IEEE
14 years 11 months ago
On the structure of some phase retrieval algorithms
The state of the art for solving the phase retrieval problem in two dimensions relies heavily on the algorithms proposed by Gerchberg, Saxton, and Fienup. Despite the widespread u...
Heinz H. Bauschke, Patrick L. Combettes, D. Russel...