Sciweavers

859 search results - page 136 / 172
» The Changing Face of Cryptography
Sort
View
ICSE
2000
IEEE-ACM
15 years 1 months ago
Software reliability and dependability: a roadmap
Software's increasing role creates both requirements for being able to trust it more than before, and for more people to know how much they can trust their software. A sound ...
Bev Littlewood, Lorenzo Strigini
POS
2000
Springer
15 years 1 months ago
TMOS: A Transactional Garbage Collector
Abstract. Defining persistence in terms of reachability is fundamental to achieving orthogonality of persistence. It is implicit to the principles of orthogonal persistence and is ...
John N. Zigman, Stephen Blackburn, J. Eliot B. Mos...
CSE
2009
IEEE
15 years 1 months ago
Towards Enabling Web 2.0 Content Sharing beyond Walled Gardens
Abstract--Web 2.0 users have many choices of contenthosting or application-service providers (CSPs). It can be difficult for a user to share content with a set of real-life friends...
San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov
AIPS
2007
15 years 2 days ago
Monitoring Plan Optimality During Execution
A great deal of research has addressed the problem of generating optimal plans, but these plans are of limited use in circumstances where noisy sensors, unanticipated exogenous ac...
Christian Fritz, Sheila A. McIlraith
ASPDAC
2008
ACM
104views Hardware» more  ASPDAC 2008»
14 years 11 months ago
Low power clock buffer planning methodology in F-D placement for large scale circuit design
Traditionally, clock network layout is performed after cell placement. Such methodology is facing a serious problem in nanometer IC designs where people tend to use huge clock buff...
Yanfeng Wang, Qiang Zhou, Yici Cai, Jiang Hu, Xian...