Sciweavers

5672 search results - page 1111 / 1135
» Design techniques for low-power systems
Sort
View
CSCW
2011
ACM
14 years 5 months ago
Real-time groupware in the browser: testing the performance of web-based networking
Standard web browsers are becoming a common platform for delivering groupware applications, but until recently, the only way to support real-time collaboration was with browser pl...
Carl A. Gutwin, Michael Lippold, T. C. Nicholas Gr...
IACR
2011
155views more  IACR 2011»
14 years 1 months ago
Terminating BKZ
Strong lattice reduction is the key element for most attacks against lattice-based cryptosystems. Between the strongest but impractical HKZ reduction and the weak but fast LLL redu...
Guillaume Hanrot, Xavier Pujol, Damien Stehl&eacut...
GIS
2007
ACM
16 years 2 months ago
Quality-driven geospatial data integration
Accurate and efficient integration of geospatial data is an important problem with applications in areas such as emergency response and urban planning. Some of the key challenges ...
Craig A. Knoblock, José Luis Ambite, Snehal...
SIGSOFT
2003
ACM
16 years 2 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
134
Voted
WWW
2005
ACM
16 years 2 months ago
A service creation environment based on end to end composition of Web services
The demand for quickly delivering new applications is increasingly becoming a business imperative today. Application development is often done in an ad hoc manner, without standar...
Vikas Agarwal, Koustuv Dasgupta, Neeran M. Karnik,...
« Prev « First page 1111 / 1135 Last » Next »