Sciweavers

631 search results - page 63 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
FDL
2008
IEEE
15 years 3 months ago
Scenario-based Validation of Embedded Systems
This paper describes a scenario-based methodology em-level design validation based on the Abstract State Machines formal method. This scenario-based approach complements an existi...
Angelo Gargantini, Elvinia Riccobene, Patrizia Sca...
NSDI
2010
15 years 3 months ago
Airavat: Security and Privacy for MapReduce
We present Airavat, a MapReduce-based system which provides strong security and privacy guarantees for distributed computations on sensitive data. Airavat is a novel integration o...
Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vit...
AAAI
2006
15 years 3 months ago
Domain-Independent Structured Duplicate Detection
The scalability of graph-search algorithms can be greatly extended by using external memory, such as disk, to store generated nodes. We consider structured duplicate detection, an...
Rong Zhou, Eric A. Hansen
CSREAEEE
2006
189views Business» more  CSREAEEE 2006»
15 years 3 months ago
Management of Dynamic and Adaptive Workflow Business Processes
: Collaborative and dynamic workflow management systems in logistic companies require strong information systems and computer support. Business processes in such industries general...
Leo Pudhota, Elizabeth Chang
IADIS
2003
15 years 3 months ago
Com Technology for Remote Database Connectivity with Wireless PDAS
The potential software market for client-side mobile applications is strongly dependent upon the ability to rapidly migrate existing in-house software solutions, while maintaining...
David Olivieri, Juan Fco. Gálvez Gál...