Sciweavers

457 search results - page 62 / 92
» Construction of a Highly Dependable Operating System
Sort
View
DBSEC
2008
196views Database» more  DBSEC 2008»
14 years 11 months ago
Shared and Searchable Encrypted Data for Untrusted Servers
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client si...
Changyu Dong, Giovanni Russello, Naranker Dulay
ISQED
2005
IEEE
76views Hardware» more  ISQED 2005»
15 years 3 months ago
Technology Mapping for Reliability Enhancement in Logic Synthesis
Abstract— Reliability enhancements are traditionally implemented through redundancies at the system level or through the use of harden-cell-designs at the circuit level. Reliabil...
Zhaojun Wo, Israel Koren
DOCENG
2004
ACM
15 years 3 months ago
On modular transformation of structural content
We show that an XML DTD (Document Type Definition) can be viewed as the fixed point of a parametric content model. We then use natural transformations from the source content mo...
Tyng-Ruey Chuang, Jan-Li Lin
IVS
2008
139views more  IVS 2008»
14 years 9 months ago
DataMeadow: a visual canvas for analysis of large-scale multivariate data
Supporting visual analytics of multiple large-scale multidimensional datasets requires a high degree of interactivity and user control beyond the conventional challenges of visual...
Niklas Elmqvist, John T. Stasko, Philippas Tsigas
JDCTA
2010
148views more  JDCTA 2010»
14 years 4 months ago
Design and Implementation of a Novel General-purpose Enterprise Application Business Infrastructure Software Platform
Platform-based development is currently the dominant development method of enterprise application, but the features provided by current mainstream enterprise application developme...
Yao Rong, Jiandong Wang