Sciweavers

6149 search results - page 176 / 1230
» Revealing the programming process
Sort
View
POPL
1995
ACM
15 years 7 months ago
Default Timed Concurrent Constraint Programming
d Abstract) We extend the model of [VRV94] to express strong time-outs (and pre-emption): if an event A does not happen through time t, cause event B to happen at time t. Such con...
Vijay A. Saraswat, Radha Jagadeesan, Vineet Gupta
106
Voted
CCR
2005
115views more  CCR 2005»
15 years 3 months ago
Experiences from the SIGCOMM 2005 European shadow PC experiment
This note is an informal report about the Shadow Program Committee experiment that I organized for Sigcomm 2005. It (i) discusses the motivation for a Shadow Program Committee (PC...
Anja Feldmann
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 7 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
100
Voted
INFORMATICALT
2007
92views more  INFORMATICALT 2007»
15 years 3 months ago
A Matrix-Based Model for Web Page Community Construction and More
The rapid development of network technologies has made the web a huge information source with its own characteristics. In most cases, traditional database-based technologies are no...
Jingyu Hou
KBSE
2007
IEEE
15 years 9 months ago
Diconic addition of failsafe fault-tolerance
We present a divide-and-conquer method, called DiConic, for automatic addition of failsafe fault-tolerance to distributed programs, where a failsafe program guarantees to meet its...
Ali Ebnenasir