Sciweavers

1663 search results - page 308 / 333
» Privacy and Identity Management
Sort
View
OOPSLA
2007
Springer
15 years 6 months ago
Software speculative multithreading for Java
We apply speculative multithreading to sequential Java programs in software to achieve speedup on existing multiprocessors. A common speculation library supports both Java bytecod...
Christopher J. F. Pickett
OOPSLA
2007
Springer
15 years 6 months ago
Improving quality together
One recent change in software development is developers starting to take responsibility for the quality of their work by writing and executing automated tests. As with any new act...
David G. Jones, Gordon R. Cameron
SEMWEB
2007
Springer
15 years 5 months ago
Access Control for Sharing Semantic Data across Desktops
Abstract. Personal Information Management (PIM) systems aim to provide convenient access to all data and metadata on a desktop to the user itself as well as the co-workers. Obvious...
Ekaterini Ioannou, Juri Luca De Coi, Arne Wolf Koe...
DASFAA
2006
IEEE
134views Database» more  DASFAA 2006»
15 years 5 months ago
Authentication of Outsourced Databases Using Signature Aggregation and Chaining
Database outsourcing is an important emerging trend which involves data owners delegating their data management needs to an external service provider. Since a service provider is a...
Maithili Narasimha, Gene Tsudik
ICMCS
2006
IEEE
146views Multimedia» more  ICMCS 2006»
15 years 5 months ago
Hybrid Traitor Tracing
In this paper we study the traitor tracing problem, a technique to help combat piracy of copyrighted materials. When a pirated copy of the material is observed, a traitor tracing ...
Hongxia Jin, Jeffery Lotspiech