Sciweavers

4820 search results - page 348 / 964
» Implementing Signatures for C
Sort
View
AH
2000
Springer
15 years 8 months ago
ConTexts: Adaptable Hypermedia
ConTexts is an implementation of and proposed design model for an adaptable hypermedia system. ConTexts provides an easy yet powerful way to author the interactive, adaptable effec...
Monica M. C. Schraefel
DEXAW
1999
IEEE
102views Database» more  DEXAW 1999»
15 years 8 months ago
NIGELOG: Protecting Logging Information by Hiding Multiple Backups in Directories
This paper proposed a novel method to protect logging information more securely. The method, named NIGELOG, produces multiple backups of the logging information, hides them in arb...
Tetsuji Takada, Hideki Koike
HOTOS
1999
IEEE
15 years 8 months ago
Drawing the Red Line in Java
Software-based protection has become a viable alternative to hardware-based protection in systems based on languages such as Java, but the absence of hardware mechanisms for prote...
Godmar Back, Wilson C. Hsieh
ASYNC
1998
IEEE
84views Hardware» more  ASYNC 1998»
15 years 8 months ago
Average-Case Optimized Transistor-Level Technology Mapping of Extended Burst-Mode Circuits
We describe an automated method (3D-map) for determining near-optimal decomposed generalized C-element (gC) implementations of extended burst-mode asynchronous controllers. Averag...
Kevin W. James, Kenneth Y. Yun
CSMR
1998
IEEE
15 years 8 months ago
The Extract-Transform-Rewrite Cycle. A Step towards MetaCARE
A conceptual reengineering framework is presented that proposes extract, transform and rewrite as three characteristic steps to be performed within a reengineering cycle. The cycl...
Jürgen Ebert, Bernt Kullbach, Andreas Panse