Sciweavers

2702 search results - page 375 / 541
» Practically Applicable Formal Methods
Sort
View
112
Voted
SIGCOMM
2009
ACM
15 years 8 months ago
Modeling and understanding end-to-end class of service policies in operational networks
Business and economic considerations are driving the extensive use of service differentiation in Virtual Private Networks (VPNs) operated for business enterprises today. The resul...
Yu-Wei Eric Sung, Carsten Lund, Mark Lyn, Sanjay G...
147
Voted
SP
2007
IEEE
105views Security Privacy» more  SP 2007»
15 years 8 months ago
Multi-Dimensional Range Query over Encrypted Data
We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and v...
Elaine Shi, John Bethencourt, Hubert T.-H. Chan, D...
114
Voted
EACL
1989
ACL Anthology
15 years 3 months ago
A rich environment for experimentation with unification grammars
This paper describes some of the features of a sophisticated language and environment designed for experimentation with unification-oriented linguistic descriptions. The system, w...
Rod L. Johnson, Mike Rosner
TROB
2002
169views more  TROB 2002»
15 years 1 months ago
Constructing reconfigurable software for machine control systems
Reconfigurable software is highly desired for automated machine tool control systems for low-cost products and short time to market. In this paper, we propose a software architectu...
Shige Wang, Kang G. Shin
EMSOFT
2010
Springer
15 years 10 days ago
Initiating a design pattern catalog for embedded network systems
In the domain of desktop software, design patterns have had a profound impact; they are applied ubiquitously across a broad range of applications. Patterns serve both to promulgat...
Sally K. Wahba, Jason O. Hallstrom, Neelam Soundar...