Sciweavers

115 search results - page 23 / 23
» Building a dependable system from a legacy application with ...
Sort
View
PLDI
2010
ACM
14 years 2 months ago
Type-preserving Compilation for End-to-end Verification of Security Enforcement
A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
Juan Chen, Ravi Chugh, Nikhil Swamy
INFOCOM
2010
IEEE
13 years 3 months ago
TopBT: A Topology-Aware and Infrastructure-Independent BitTorrent Client
—BitTorrent (BT) has carried out a significant and continuously increasing portion of Internet traffic. While several designs have been recently proposed and implemented to imp...
Shansi Ren, Enhua Tan, Tian Luo, Songqing Chen, Le...
ICC
2007
IEEE
214views Communications» more  ICC 2007»
13 years 11 months ago
Distributed ONS and its Impact on Privacy
— The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC). A so-called Object Naming...
Benjamin Fabian, Oliver Günther
WWW
2003
ACM
13 years 10 months ago
Finnish Museums on the Semantic Web
This article presents the semantic portal MUSEUMFINLAND for publishing heterogeneous museum collections on the Semantic Web. It is shown how museums with their semantically rich a...
Eero Hyvönen, Suvi Kettula, Vilho Raatikka, S...
SIGMOD
1997
ACM
131views Database» more  SIGMOD 1997»
13 years 9 months ago
Maintenance of Data Cubes and Summary Tables in a Warehouse
Data warehouses contain large amounts of information, often collected from a variety of independent sources. Decision-support functions in a warehouse, such as on-line analytical ...
Inderpal Singh Mumick, Dallan Quass, Barinderpal S...