Sciweavers

4764 search results - page 630 / 953
» Applications of Error-Control Coding
Sort
View
143
Voted
AMAST
2004
Springer
15 years 10 months ago
On Guard: Producing Run-Time Checks from Integrity Constraints
Abstract. Software applications are inevitably concerned with data integrity, whether the data is stored in a database, files, or program memory. An integrity guard is code execut...
Michael Benedikt, Glenn Bruns
146
Voted
ATAL
2004
Springer
15 years 10 months ago
Using the Experimental Method to Produce Reliable Self-Organised Systems
The ‘engineering’ and ‘adaptive’ approaches to system production are distinguished. It is argued that producing reliable self-organised software systems (SOSS) will necessa...
Bruce Edmonds
139
Voted
CCS
2004
ACM
15 years 10 months ago
Reusable cryptographic fuzzy extractors
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret—a major shortcoming in the case of...
Xavier Boyen
131
Voted
EUROPAR
2004
Springer
15 years 10 months ago
More Legal Transformations for Locality
Abstract. Program transformations are one of the most valuable compiler techniques to improve data locality. However, restructuring compilers have a hard time coping with data depe...
Cédric Bastoul, Paul Feautrier
ICCS
2004
Springer
15 years 10 months ago
An Atmospheric Sciences Workflow and Its Implementation with Web Services
: Computational and data Grids couple geographically distributed resources such as high performance computers, workstations, clusters, and scientific instruments. Grid Workflows co...
David Abramson, Jagan Kommineni, John L. McGregor,...