Sciweavers

16859 search results - page 3145 / 3372
» Generative software development
Sort
View
113
Voted
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 9 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
132
Voted
PLDI
2009
ACM
15 years 9 months ago
Snugglebug: a powerful approach to weakest preconditions
Symbolic analysis shows promise as a foundation for bug-finding, specification inference, verification, and test generation. This paper addresses demand-driven symbolic analysi...
Satish Chandra, Stephen J. Fink, Manu Sridharan
136
Voted
SAC
2009
ACM
15 years 9 months ago
Diverse peer selection in collaborative web search
Effective peer selection for intelligent query routing is a challenge in collaborative peer-based Web search systems, especially unstructured networks that do not have any central...
Le-Shin Wu, Filippo Menczer
154
Voted
SENSYS
2009
ACM
15 years 9 months ago
Low-power clock synchronization using electromagnetic energy radiating from AC power lines
Clock synchronization is highly desirable in many sensor networking applications. It enables event ordering, coordinated actuation, energy-efficient communication and duty cyclin...
Anthony Rowe, Vikram Gupta, Ragunathan Rajkumar
110
Voted
BIRTHDAY
2009
Springer
15 years 9 months ago
Web Service Composition via the Customization of Golog Programs with User Preferences
Abstract. We claim that user preferences are a key component of effective Web service composition, and one that has largely been ignored. In this paper we propose a means of speci...
Shirin Sohrabi, Nataliya Prokoshyna, Sheila A. McI...
« Prev « First page 3145 / 3372 Last » Next »