Sciweavers

4184 search results - page 785 / 837
» Names of Our Lives
Sort
View
DRM
2003
Springer
15 years 3 months ago
Obfuscation of design intent in object-oriented applications
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon
WWW
2010
ACM
15 years 2 months ago
FormSys: form-processing web services
In this paper we present FormSys, a Web-based system that service-enables form documents. It offers two main services: filling in forms based on Web services’ incoming SOAP me...
Ingo M. Weber, Hye-Young Paik, Boualem Benatallah,...
DATE
2010
IEEE
157views Hardware» more  DATE 2010»
15 years 2 months ago
RMOT: Recursion in model order for task execution time estimation in a software pipeline
Abstract—This paper addresses the problem of execution time estimation for tasks in a software pipeline independent of the application structure or the underlying architecture. A...
Nabeel Iqbal, M. A. Siddique, Jörg Henkel
CLOUD
2010
ACM
15 years 2 months ago
RACS: a case for cloud storage diversity
The increasing popularity of cloud storage is leading organizations to consider moving data out of their own data centers and into the cloud. However, success for cloud storage pr...
Hussam Abu-Libdeh, Lonnie Princehouse, Hakim Weath...
SWAT
2010
Springer
250views Algorithms» more  SWAT 2010»
15 years 2 months ago
Fixed-Parameter Algorithms for Cochromatic Number and Disjoint Rectangle Stabbing
Given a permutation π of {1, . . . , n} and a positive integer k, we give an algorithm with running time 2O(k2 log k) nO(1) that decides whether π can be partitioned into at mos...
Pinar Heggernes, Dieter Kratsch, Daniel Lokshtanov...