Sciweavers

642 search results - page 85 / 129
» Once Upon a Type
Sort
View
CSFW
1998
IEEE
15 years 4 months ago
Proving Security Protocols with Model Checkers by Data Independence Techniques
Model checkers such as FDR have been extremely e ective in checking for, and nding, attacks on cryptographic protocols { see, for example 11, 12, 14] and many of the papers in 3]....
A. W. Roscoe
OOPSLA
1999
Springer
15 years 4 months ago
The Generic Graph Component Library
In this paper we present the Generic Graph Component Library (GGCL), a generic programming framework for graph data structures and graph algorithms. Following the theme of the Sta...
Lie-Quan Lee, Jeremy G. Siek, Andrew Lumsdaine
IPPS
1997
IEEE
15 years 4 months ago
Time-Stamping Algorithms for Parallelization of Loops at Run-Time
In this paper, we present two new run-time algorithms for the parallelization of loops that have indirect access patterns. The algorithms can handle any type of loop-carried depen...
Cheng-Zhong Xu, Vipin Chaudhary
CIKM
1997
Springer
15 years 4 months ago
The Need for Metrics in Visual Information Analysis
CT This paper explores several methods for visualizing the thematic content of large document collections. As opposed to traditional query-driven document retrieval, these methods ...
Nancy Miller, Elizabeth G. Hetzler, Grant Nakamura...
HPCN
1997
Springer
15 years 4 months ago
An ATM-based Distributed High Performance Computing System
We describe the distributed high performance computing system we have developed to integrate together a heterogeneous set of high performance computers, high capacity storage syst...
Kenneth A. Hawick, Heath A. James, Kevin Maciunas,...