Sciweavers

43190 search results - page 8529 / 8638
» Can Development Be Designed
Sort
View
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
15 years 8 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
GIS
2007
ACM
15 years 8 months ago
Pipelined spatial join processing for quadtree-based indexes
Spatial join is an important yet costly operation in spatial databases. In order to speed up the execution of a spatial join, the input tables are often indexed based on their spa...
Walid G. Aref
GRID
2007
Springer
15 years 8 months ago
Global-scale peer-to-peer file services with DFS
The global inter-networking infrastructure that has become essential for contemporary day-to-day computing and communication tasks, has also enabled the deployment of several large...
Antony Chazapis, Georgios Tsoukalas, Georgios Veri...
EUROSYS
2009
ACM
15 years 8 months ago
Effective and efficient compromise recovery for weakly consistent replication
Weakly consistent replication of data has become increasingly important both for loosely-coupled collections of personal devices and for large-scale infrastructure services. Unfor...
Prince Mahajan, Ramakrishna Kotla, Catherine C. Ma...
GIS
2009
ACM
15 years 8 months ago
Classification of raster maps for automatic feature extraction
Raster maps are widely available and contain useful geographic features such as labels and road lines. To extract the geographic features, most research work relies on a manual st...
Yao-Yi Chiang, Craig A. Knoblock
« Prev « First page 8529 / 8638 Last » Next »