Sciweavers

2251 search results - page 439 / 451
» Specification and Implementation Problems for C
Sort
View
117
Voted
CCS
2009
ACM
15 years 6 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
ICFP
1999
ACM
15 years 6 months ago
Type Inference Builds a Short Cut to Deforestation
Deforestation optimises a functional program by transforming it into another one that does not create certain intermediate data structures. Short cut deforestation is a deforestat...
Olaf Chitil
142
Voted
VLDB
1999
ACM
145views Database» more  VLDB 1999»
15 years 6 months ago
DBMSs on a Modern Processor: Where Does Time Go?
Recent high-performance processors employ sophisticated techniques to overlap and simultaneously execute multiple computation and memory operations. Intuitively, these techniques ...
Anastassia Ailamaki, David J. DeWitt, Mark D. Hill...
HICSS
1996
IEEE
94views Biometrics» more  HICSS 1996»
15 years 6 months ago
TREAT: Promoting SME Adoption of EDI through Education
Electronic Data Interchange (EDI), an example of an Inter-Organisational System (IOS), has the potential to provide companies with tangible benefits, such as improvements to overa...
Craig M. Parker, Paula M. C. Swatman
SIGSOFT
1996
ACM
15 years 6 months ago
Tool Support for Planning the Restructuring of Data Abstractions in Large Systems
Abstractions in Large Systems William G. Griswold, Member, IEEE, Morison I. Chen, Robert W. Bowdidge, Jenny L. Cabaniss, Van B. Nguyen, and J. David Morgenthaler Restructuring soft...
William G. Griswold, Morison I. Chen, Robert W. Bo...