Sciweavers

1528 search results - page 62 / 306
» Implementing Generalized Operator Overloading
Sort
View
EDBT
1992
ACM
79views Database» more  EDBT 1992»
15 years 8 months ago
Theoretical Aspects of Schema Merging
A general technique for merging database schemas is developed that has a number of advantages over existing techniques, the most important of which is that schemas are placed in a...
Peter Buneman, Susan B. Davidson, Anthony Kosky
ACSAC
2009
IEEE
15 years 11 months ago
Deploying and Monitoring DNS Security (DNSSEC)
—SecSpider is a DNSSEC monitoring system that helps identify operational errors in the DNSSEC deployment and discover unforeseen obstacles. It collects, verifies, and publishes ...
Eric Osterweil, Daniel Massey, Lixia Zhang
130
Voted
PKC
1999
Springer
94views Cryptology» more  PKC 1999»
15 years 8 months ago
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor
Public-key implementers often face strong hardware-related constraints. In particular, modular operations required in most cryptosystems generally constitute a computational bottle...
Pascal Paillier
ICSE
2008
IEEE-ACM
16 years 5 months ago
Answering conceptual queries with Ferret
Programmers seek to answer questions as they investigate the functioning of a software system, such as "which execution path is being taken in this case?" Programmers at...
Brian de Alwis, Gail C. Murphy
167
Voted
TPDS
2002
104views more  TPDS 2002»
15 years 4 months ago
Performance Guarantees for Web Server End-Systems: A Control-Theoretical Approach
The Internet is undergoing substantial changes from a communication and browsing infrastructure to a medium for conducting business and marketing a myriad of services. The World W...
Tarek F. Abdelzaher, Kang G. Shin, Nina T. Bhatti