Sciweavers

4190 search results - page 388 / 838
» Implementing commitment-based interactions
Sort
View
ICDE
2009
IEEE
138views Database» more  ICDE 2009»
15 years 2 months ago
Similarity Group-By
The identification and processing of similarities in the data play a key role in multiple application scenarios. Several types of similarity-aware operations have been studied in ...
Yasin N. Silva, Walid G. Aref, Mohamed H. Ali
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
15 years 2 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
129
Voted
ACSC
2010
IEEE
14 years 12 months ago
Analysis of the periodical payment framework using restricted proxy certificates
This paper discusses the design and implementation of a payment framework that is loosely based on the direct debit payment model. We define such payments as one in which customer...
Grigori Goldman, Lawrie Brown
DATE
2009
IEEE
168views Hardware» more  DATE 2009»
15 years 11 months ago
Selective state retention design using symbolic simulation
Abstract—Addressing both standby and active power is a major challenge in developing System-on-Chip designs for batterypowered products. Powering off sections of logic or memorie...
Ashish Darbari, Bashir M. Al-Hashimi, David Flynn,...
TSE
1998
176views more  TSE 1998»
15 years 4 months ago
Constructive Protocol Specification Using Cicero
—New protocols are often useful, but are hard to implement well. Protocol synthesis is a solution, but synthesized protocols can be slow. Implementing protocols will be even more...
Yen-Min Huang, Chinya V. Ravishankar