Sciweavers

350 search results - page 29 / 70
» Improving application security with data flow assertions
Sort
View
GEOINFO
2003
14 years 11 months ago
Planning Brazilian Urban Traffic with a Geographic Application Software
Planning and optimizing urban traffic is a difficult problem, with considerable economic and social impacts. The development of suitable software tools to aid municipal governments...
Juliano Lopes de Oliveira, André Constantin...
ASIACRYPT
2009
Springer
15 years 4 months ago
Secure Two-Party Computation Is Practical
Abstract. Secure multi-party computation has been considered by the cryptographic community for a number of years. Until recently it has been a purely theoretical area, with few im...
Benny Pinkas, Thomas Schneider, Nigel P. Smart, St...
MCS
2004
Springer
15 years 3 months ago
High Security Fingerprint Verification by Perceptron-Based Fusion of Multiple Matchers
Recent works about perceptron-based fusion of multiple fingerprint matchers showed the effectiveness of such approach in improving the performance of personal identity verification...
Gian Luca Marcialis, Fabio Roli
97
Voted
ICS
1994
Tsinghua U.
15 years 1 months ago
Evaluating automatic parallelization for efficient execution on shared-memory multiprocessors
We present a parallel code generation algorithm for complete applications and a new experimental methodology that tests the efficacy of our approach. The algorithm optimizes for d...
Kathryn S. McKinley
90
Voted
HPDC
2010
IEEE
14 years 10 months ago
Detouring and replication for fast and reliable internet-scale stream processing
iFlow is a replication-based system that can achieve both fast and reliable processing of high volume data streams on the Internet scale. iFlow uses a low degree of replication in...
Christopher McConnell, Fan Ping, Jeong-Hyon Hwang