Sciweavers

1650 search results - page 180 / 330
» How to Turn the Page
Sort
View
KIVS
1999
Springer
15 years 2 months ago
Cost and Price Calculation for Internet Integrated Services
Abstract Charging schemes are needed to protect an integrated services network from arbitrary resource reservations and to create a funding mechanism to extend network capacity at ...
Martin Karsten, Jens Schmitt, Lars C. Wolf, Ralf S...
ICPP
1996
IEEE
15 years 2 months ago
Scalable S-to-P Broadcasting on Message-Passing MPPs
In s-to-p broadcasting, s processors in a p-processor machine contain a message to be broadcast to all the processors, 1 s p. We present a number of different broadcasting algori...
Susanne E. Hambrusch, Ashfaq A. Khokhar, Yi Liu
PEPM
1993
ACM
15 years 2 months ago
Binding-Time Analysis and the Taming of C Pointers
The aim of binding-time analysis is to determine when variables, expressions, statements, etc. in a program can be evaluated by classifying these into static (compile-time) and dy...
Lars Ole Andersen
VL
1992
IEEE
163views Visual Languages» more  VL 1992»
15 years 2 months ago
The Conversion of Diagrams to Knowledge Bases
If future electronic documents are to be truly useful, we must devise ways to automatically turn them into knowledgebases. In particular, we must be able to do this for diagrams. ...
Robert P. Futrelle
ASIACRYPT
2009
Springer
15 years 2 months ago
Proofs of Storage from Homomorphic Identification Protocols
Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constru...
Giuseppe Ateniese, Seny Kamara, Jonathan Katz