Sciweavers

6574 search results - page 70 / 1315
» Current Signatures: Application
Sort
View
SQJ
2010
112views more  SQJ 2010»
14 years 7 months ago
Improving design-pattern identification: a new approach and an exploratory study
The identification of occurrences of design patterns in programs can help maintainers to understand the program design and implementation. It can also help them to make informed ch...
Yann-Gaël Guéhéneuc, Jean-Yves ...
DRM
2006
Springer
15 years 4 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
145
Voted
INFOCOM
1998
IEEE
15 years 5 months ago
Compact and Unforgeable Key Establishment over an ATM Network
Authenticated session key establishment is a central issue in network security. This paper addresses a question on whether we can design a compact, efficient and authenticated key ...
Yuliang Zheng, Hideki Imai
NAR
2010
123views more  NAR 2010»
14 years 7 months ago
Discovering causal signaling pathways through gene-expression patterns
High-throughput gene-expression studies result in lists of differentially expressed genes. Most current meta-analyses of these gene lists include searching for significant members...
Jignesh R. Parikh, Bertram Klinger, Yu Xia, Jarrod...
PVLDB
2010
164views more  PVLDB 2010»
14 years 11 months ago
FlashStore: High Throughput Persistent Key-Value Store
We present FlashStore, a high throughput persistent keyvalue store, that uses flash memory as a non-volatile cache between RAM and hard disk. FlashStore is designed to store the ...
Biplob Debnath, Sudipta Sengupta, Jin Li