Sciweavers

7080 search results - page 1339 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
ICASSP
2011
IEEE
14 years 2 months ago
SEAMLESS P2P-MDVC with well-balanced descriptions
Multiple-description coding (MDC) provides a promising solution to support the error-prone transmission over multiple channels. One extremely important application is to design ef...
Shuyuan Zhu, Jeff Siu-Kei Au-Yeung, Bing Zeng
POPL
2012
ACM
13 years 6 months ago
Higher-order functional reactive programming in bounded space
Functional reactive programming (FRP) is an elegant and successful approach to programming reactive systems declaratively. The high levels of abstraction and expressivity that mak...
Neelakantan R. Krishnaswami, Nick Benton, Jan Hoff...
OSDI
2002
ACM
15 years 11 months ago
Vertigo: Automatic Performance-Setting for Linux
Combining high performance with low power consumption is becoming one of the primary objectives of processor designs. Instead of relying just on sleep mode for conserving power, a...
Krisztián Flautner, Trevor N. Mudge
FSTTCS
2003
Springer
15 years 4 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
EUROSYS
2009
ACM
15 years 8 months ago
User interactions in social networks and their implications
Social networks are popular platforms for interaction, communication and collaboration between friends. Researchers have recently proposed an emerging class of applications that l...
Christo Wilson, Bryce Boe, Alessandra Sala, Krishn...
« Prev « First page 1339 / 1416 Last » Next »