Sciweavers

26354 search results - page 5070 / 5271
» How we refactor, and how we know it
Sort
View
SSS
2007
Springer
121views Control Systems» more  SSS 2007»
15 years 8 months ago
Byzantine Self-stabilizing Pulse in a Bounded-Delay Model
Abstract. “Pulse Synchronization” intends to invoke a recurring distributed event at the different nodes, of a distributed system as simultaneously as possible and with a freq...
Danny Dolev, Ezra N. Hoch
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 8 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin
132
Voted
VLDB
2007
ACM
182views Database» more  VLDB 2007»
15 years 8 months ago
Continuous Queries in Oracle
This paper describes Continuous Queries (CQ) in Oracle RDBMS, a feature that incorporates stream and complex event processing into an RDBMS, the first such attempt in commercial d...
Sankar Subramanian, Srikanth Bellamkonda, Hua-Gang...
BSN
2006
IEEE
131views Sensor Networks» more  BSN 2006»
15 years 8 months ago
Elaborating Sensor Data using Temporal and Spatial Commonsense Reasoning
Ubiquitous computing has established a vision of computation where computers are so deeply integrated into our lives that they become both invisible and everywhere. In order to ha...
Bo Morgan, Push Singh
130
Voted
CCGRID
2006
IEEE
15 years 8 months ago
A Shibboleth-Protected Privilege Management Infrastructure for e-Science Education
Simplifying access to and usage of large scale compute resources via the Grid is of critical importance to encourage the uptake of e-Research. Security is one aspect that needs to...
J. P. Watt, Oluwafemi Ajayi, Jipu Jiang, Jos Koets...
« Prev « First page 5070 / 5271 Last » Next »