Sciweavers

1120 search results - page 161 / 224
» C Elements of Style
Sort
View
180
Voted
ECOOP
2009
Springer
16 years 15 days ago
From Public to Private to Absent: Refactoring Java Programs under Constrained Accessibility
Contemporary refactoring tools for JAVA aiding in the restructuring of programs have problems with respecting access modifiers such as public and private: while some tools provide ...
Friedrich Steimann, Andreas Thies
PKC
2009
Springer
164views Cryptology» more  PKC 2009»
16 years 12 days ago
Asynchronous Multiparty Computation: Theory and Implementation
Abstract. We propose an asynchronous protocol for general multiparty computation with perfect security and communication complexity O(n2 |C|k) where n is the number of parties, |C|...
Ivan Damgård, Jesper Buus Nielsen, Martin Ge...
CHI
2008
ACM
16 years 8 days ago
Paperproof: a paper-digital proof-editing system
Recent approaches for linking paper and digital information or services tend to be based on a one-time publishing of digital information where changes to the printed document beco...
Nadir Weibel, Adriana Ispas, Beat Signer, Moira C....
OSDI
2008
ACM
16 years 5 days ago
Block Mason
The flexibility provided by hardware virtualization allows administrators to rapidly create, destroy, and migrate systems across physical hosts. Unfortunately, the storage systems...
Dutch T. Meyer, Brendan Cully, Jake Wires, Norman ...
OSDI
2004
ACM
16 years 5 days ago
Automatic Misconfiguration Troubleshooting with PeerPressure
Technical support contributes 17% of the total cost of ownership of today's desktop PCs [25]. An important element of technical support is troubleshooting misconfigured appli...
Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang...