Sciweavers

1530 search results - page 185 / 306
» Design and Implementation of a Key-Lifecycle Management Syst...
Sort
View
209
Voted
POPL
2012
ACM
13 years 11 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
130
Voted
ICS
2009
Tsinghua U.
15 years 1 months ago
Refereeing conflicts in hardware transactional memory
In the search for high performance, most transactional memory (TM) systems execute atomic blocks concurrently and must thus be prepared for data conflicts. The TM system must then...
Arrvindh Shriraman, Sandhya Dwarkadas
130
Voted
PODS
2007
ACM
109views Database» more  PODS 2007»
16 years 3 months ago
What is "next" in event processing?
Event processing systems have wide applications ranging from managing events from RFID readers to monitoring RSS feeds. Consequently, there exists much work on them in the literat...
Walker M. White, Mirek Riedewald, Johannes Gehrke,...
131
Voted
HICSS
1997
IEEE
146views Biometrics» more  HICSS 1997»
15 years 7 months ago
Intelligent Agents for Matching Information Providers and Consumers on the World-Wide-Web
In this paper, we discuss the various issues in designing intelligent software systems to assist worldwide-web users in locating relevant information. We identi3 a number of key c...
Joseph K. W. Lee, David Wai-Lok Cheung, Ben Kao, J...
115
Voted
CCS
1993
ACM
15 years 7 months ago
Why Cryptosystems Fail
Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionall...
Ross J. Anderson