Sciweavers

24529 search results - page 4657 / 4906
» Computing on Authenticated Data
Sort
View
PLDI
2003
ACM
15 years 9 months ago
A provably sound TAL for back-end optimization
Typed assembly languages provide a way to generate machinecheckable safety proofs for machine-language programs. But the soundness proofs of most existing typed assembly languages...
Juan Chen, Dinghao Wu, Andrew W. Appel, Hai Fang
SACMAT
2003
ACM
15 years 9 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
SASN
2003
ACM
15 years 9 months ago
Secure multicast groups on ad hoc networks
In this paper we address the problem of secure multicast of data streams over a multihop wireless ad hoc network. We propose a dynamic multicast group management protocol that aim...
Tansel Kaya, Guolong Lin, Guevara Noubir, A. Yilma...
SIGUCCS
2003
ACM
15 years 9 months ago
Higher education ERP: a framework to reduce the pain
Higher Education Institutions are now spending a significant portion of their budget to implement and maintain modern Enterprise Resource Planning (ERP) solutions. ERP is a softwa...
Kris T. Pegah, Mahmoud Pegah, Terry M. Dillow
SPAA
2003
ACM
15 years 9 months ago
Performance comparison of MPI and three openMP programming styles on shared memory multiprocessors
When using a shared memory multiprocessor, the programmer faces the selection of the portable programming model which will deliver the best performance. Even if he restricts his c...
Géraud Krawezik
« Prev « First page 4657 / 4906 Last » Next »