Sciweavers

1530 search results - page 219 / 306
» Design and Implementation of a Key-Lifecycle Management Syst...
Sort
View
CIKM
2010
Springer
14 years 10 months ago
Towards a provenance framework for sub-image processing for astronomical data
While there has been advances in observational equipment that generate huge high quality images, the processing of these images remains a major bottleneck. We show that provenance...
Johnson Mwebaze, John McFarland, Danny Booxhorn, E...
94
Voted
ACSAC
2010
IEEE
14 years 10 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
TPDS
2002
134views more  TPDS 2002»
14 years 11 months ago
Performance of CORBA-Based Client-Server Architectures
Middleware has been introduced to provide interoperability as well as transparent location of servers in heterogeneous client-server environments. Although such benefits accrue fro...
Istabrak Abdul-Fatah, Shikharesh Majumdar
EUROSYS
2006
ACM
15 years 9 months ago
Solving the starting problem: device drivers as self-describing artifacts
Run-time conflicts can affect even the most rigorously tested software systems. A reliance on execution-based testing makes it prohibitively costly to test every possible interac...
Michael F. Spear, Tom Roeder, Orion Hodson, Galen ...
OSDI
2002
ACM
16 years 5 days ago
Vertigo: Automatic Performance-Setting for Linux
Combining high performance with low power consumption is becoming one of the primary objectives of processor designs. Instead of relying just on sleep mode for conserving power, a...
Krisztián Flautner, Trevor N. Mudge