Sciweavers

384 search results - page 77 / 77
» Automatic framework generation for hard real-time applicatio...
Sort
View
CCS
2005
ACM
13 years 11 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
ISPAN
1997
IEEE
13 years 9 months ago
A New General Purpose Parallel Database System
This paper is concerned with the transparent parallelisation of declarative database queries, based on theoretical principles. We have designed an entire database architecture sui...
Mohamad Afshar, J. Bates, Gavin M. Bierman, K. Moo...
TASE
2011
IEEE
13 years 9 days ago
WireWarping++: Robust and Flexible Surface Flattening With Length Control
— Surface flattening has numerous applications in sheet manufacturing industries, such as garment industry, shoe industry, toy industry, furniture industry and ship industry. Mo...
Yunbo Zhang, Charlie C. L. Wang
CIKM
2004
Springer
13 years 10 months ago
Composable XML integration grammars
The proliferation of XML as a standard for data representation and exchange in diverse, next-generation Web applications has created an emphatic need for effective XML data-integr...
Wenfei Fan, Minos N. Garofalakis, Ming Xiong, Xibe...