Sciweavers

26 search results - page 4 / 6
» Verifying Reuse Contracts with a Component Model
Sort
View
IJNSEC
2007
164views more  IJNSEC 2007»
13 years 7 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
CL
2008
Springer
13 years 7 months ago
Automatic synthesis and verification of real-time embedded software for mobile and ubiquitous systems
Currently available application frameworks that target the automatic design of real-time embedded software are poor in integrating functional and non-functional requirements for m...
Pao-Ann Hsiung, Shang-Wei Lin
ECOOP
2008
Springer
13 years 9 months ago
Programming with Live Distributed Objects
A component revolution is underway, bringing developers improved productivity and opportunities for code reuse. However, whereas existing tools work well for builders of desktop ap...
Krzysztof Ostrowski, Ken Birman, Danny Dolev, Jong...
LCPC
2004
Springer
14 years 21 days ago
Empirical Performance-Model Driven Data Layout Optimization
Abstract. Empirical optimizers like ATLAS have been very effective in optimizing computational kernels in libraries. The best choice of parameters such as tile size and degree of l...
Qingda Lu, Xiaoyang Gao, Sriram Krishnamoorthy, Ge...
WSC
2001
13 years 8 months ago
An object-oriented paradigm for simulating postal distribution centers
Discrete-event simulation is an established tool for the design and management of large-scale mail sortation and distribution systems. Because the design of distribution facilitie...
K. Preston White, Brian Barney, Scott Keller, Robe...