Sciweavers

1530 search results - page 230 / 306
» Design and Implementation of a Key-Lifecycle Management Syst...
Sort
View
WWW
2008
ACM
15 years 10 months ago
The locative web
The concept of location has become very popular in many applications on the Web, in particular for those which aim at connecting the real world with resources on the Web. However,...
Erik Wilde, Martin Kofahl
SIGMOD
2007
ACM
176views Database» more  SIGMOD 2007»
15 years 10 months ago
URank: formulation and efficient evaluation of top-k queries in uncertain databases
Top-k processing in uncertain databases is semantically and computationally different from traditional top-k processing. The interplay between query scores and data uncertainty ma...
Mohamed A. Soliman, Ihab F. Ilyas, Kevin Chen-Chua...
PEPM
2010
ACM
15 years 6 months ago
Clone detection and elimination for Haskell
Duplicated code is a well known problem in software maintenance and refactoring. Code clones tend to increase program size and several studies have shown that duplicated code make...
Christopher Brown, Simon Thompson
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
15 years 4 months ago
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the...
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley...
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
15 years 4 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar