Sciweavers

1843 search results - page 346 / 369
» Securing Class Initialization
Sort
View
133
Voted
ER
2005
Springer
200views Database» more  ER 2005»
15 years 6 months ago
How to Tame a Very Large ER Diagram (Using Link Analysis and Force-Directed Drawing Algorithms)
Abstract. Understanding a large schema without the assistance of persons already familiar with it (and its associated applications), is a hard and very time consuming task that occ...
Yannis Tzitzikas, Jean-Luc Hainaut
103
Voted
ISRR
2005
Springer
138views Robotics» more  ISRR 2005»
15 years 6 months ago
One Is Enough!
We postulate that multi-wheel statically-stable mobile robots for operation in human environments are an evolutionarydead end. Robots of this class tall enough to interact meaning...
Tom Lauwers, George Kantor, Ralph L. Hollis
102
Voted
PODC
2004
ACM
15 years 6 months ago
Mechanism design for policy routing
The Border Gateway Protocol (BGP) for interdomain routing is designed to allow autonomous systems (ASes) to express policy preferences over alternative routes. We model these pref...
Joan Feigenbaum, Rahul Sami, Scott Shenker
114
Voted
SAC
2004
ACM
15 years 6 months ago
Forest trees for on-line data
This paper presents an hybrid adaptive system for induction of forest of trees from data streams. The Ultra Fast Forest Tree system (UFFT) is an incremental algorithm, with consta...
João Gama, Pedro Medas, Ricardo Rocha
125
Voted
EUROCRYPT
2004
Springer
15 years 6 months ago
Positive Results and Techniques for Obfuscation
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P) with the same functionality as P, but such that O(P)...
Ben Lynn, Manoj Prabhakaran, Amit Sahai