Sciweavers

1363 search results - page 201 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
ISPD
2003
ACM
133views Hardware» more  ISPD 2003»
15 years 4 months ago
Optimal minimum-delay/area zero-skew clock tree wire-sizing in pseudo-polynomial time
In 21st-Century VLSI design, clocking plays crucial roles for both performance and timing convergence. Due to their non-convex nature, optimal minimum-delay/area zero-skew wire-si...
Jeng-Liang Tsai, Tsung-Hao Chen, Charlie Chung-Pin...
SIGMOD
2010
ACM
305views Database» more  SIGMOD 2010»
15 years 3 months ago
MoveMine: mining moving object databases
With the maturity of GPS, wireless, and Web technologies, increasing amounts of movement data collected from various moving objects, such as animals, vehicles, mobile devices, and...
Zhenhui Li, Ming Ji, Jae-Gil Lee, Lu An Tang, Yint...
NDSS
2000
IEEE
15 years 3 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
15 years 3 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
SIGCPR
2000
ACM
173views Hardware» more  SIGCPR 2000»
15 years 3 months ago
Hollywood: a business model for the future?
This paper elucidates an emergent theory of organizational structure, process and leadership which the author believes will characterize the Internet based workplace of the future...
Charles E. Grantham