Sciweavers

5302 search results - page 49 / 1061
» Learning How to Separate
Sort
View
ICWE
2005
Springer
15 years 5 months ago
Separation of Navigation Routing Code in J2EE Web Applications
The navigation routing code of a web application is the part of the code involved in routing a request from a web page through the appropriate components on the server, typically e...
Minmin Han, Christine Hofmeister
OOPSLA
1995
Springer
15 years 3 months ago
Bidirectional Object Layout for Separate Compilation
Existing schemes for object layout and dispatch in the presence of multiple inheritance and separate compilation waste space and are slower than systems with single inheritance. T...
Andrew C. Myers
FSE
2005
Springer
112views Cryptology» more  FSE 2005»
15 years 5 months ago
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors
Abstract. This paper discusses the state-of-the-art software optimization methodology for symmetric cryptographic primitives on Pentium III and 4 processors. We aim at maximizing s...
Mitsuru Matsui, Sayaka Fukuda
ACNS
2003
Springer
130views Cryptology» more  ACNS 2003»
15 years 5 months ago
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
Gene Itkis, Peng Xie
USAB
2008
15 years 1 months ago
How Image Based Factors and Human Factors Contribute to Threat Detection Performance in X-Ray Aviation Security Screening
The present study examines the relative importance of a series of known and expected factors that highly affect threat detection performance in aviation security X-ray screening. E...
Anton Bolfing, Tobias Halbherr, Adrian Schwaninger