Sciweavers

9186 search results - page 1507 / 1838
» A Module System for Scheme
Sort
View
117
Voted
WWW
2010
ACM
15 years 8 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
DRM
2003
Springer
15 years 8 months ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia
141
Voted
ISCA
2010
IEEE
284views Hardware» more  ISCA 2010»
15 years 8 months ago
Security refresh: prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address
Phase change memory (PCM) is an emerging memory technology for future computing systems. Compared to other non-volatile memory alternatives, PCM is more matured to production, and...
Nak Hee Seong, Dong Hyuk Woo, Hsien-Hsin S. Lee
SIGMETRICS
2010
ACM
187views Hardware» more  SIGMETRICS 2010»
15 years 8 months ago
Can multipath mitigate power law delays?: effects of parallelism on tail performance
—Parallelism has often been used to improve the reliability and efficiency of a variety of different engineering systems. In this paper, we quantify the efficiency of paralleli...
Jian Tan, Wei Wei, Bo Jiang, Ness Shroff, Donald F...
145
Voted
LSSC
2001
Springer
15 years 8 months ago
Parallel Implementation of a Large-Scale 3-D Air Pollution Model
Abstract. Air pollution models can efficiently be used in different environmental studies. The atmosphere is the most dynamic component of the environment, where the pollutants ca...
Tzvetan Ostromsky, Zahari Zlatev
« Prev « First page 1507 / 1838 Last » Next »