Sciweavers

2340 search results - page 120 / 468
» Data abstraction and information hiding
Sort
View
ICPP
1994
IEEE
15 years 2 months ago
Cachier: A Tool for Automatically Inserting CICO Annotations
Shared memory in a parallel computer provides prowith the valuable abstraction of a shared address space--through which any part of a computation can access any datum. Although un...
Trishul M. Chilimbi, James R. Larus
CTRSA
2009
Springer
128views Cryptology» more  CTRSA 2009»
15 years 4 months ago
Short Redactable Signatures Using Random Trees
Abstract. A redactable signature scheme for a string of objects supports verification even if multiple substrings are removed from the original string. It is important that the re...
Ee-Chien Chang, Chee Liang Lim, Jia Xu
GRID
2007
Springer
14 years 10 months ago
Introduce: An Open Source Toolkit for Rapid Development of Strongly Typed Grid Services
Abstract Service-oriented architectures and applications have gained wide acceptance in the Grid computing community. A number of tools and middleware systems have been developed t...
Shannon Hastings, Scott Oster, Stephen Langella, D...
TON
2012
13 years 11 days ago
A New Cell-Counting-Based Attack Against Tor
Abstract—Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communicat...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
JODS
2006
111views Data Mining» more  JODS 2006»
14 years 10 months ago
Interoperability Through Emergent Semantics A Semiotic Dynamics Approach
Abstract. We study the exchange of information in collective information systems mediated by information agents, focusing specifically on the problem of semantic interoperability. ...
Luc Steels, Peter Hanappe