Sciweavers

617 search results - page 87 / 124
» The General Architecture of Generation in ACORD
Sort
View
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
15 years 4 months ago
Demystifying magic: high-level low-level programming
r of high-level languages lies in their abstraction over hardware and software complexity, leading to greater security, better reliability, and lower development costs. However, o...
Daniel Frampton, Stephen M. Blackburn, Perry Cheng...
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
15 years 4 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
IMC
2009
ACM
15 years 4 months ago
Modeling user activities in a large IPTV system
Internet Protocol Television (IPTV) has emerged as a new delivery method for TV. In contrast with native broadcast in traditional cable and satellite TV system, video streams in I...
Tongqing Qiu, Zihui Ge, Seungjoon Lee, Jia Wang, J...
SUTC
2008
IEEE
15 years 4 months ago
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
Po-Yi Li, Wen-Chih Peng, Tsung-Wei Wang, Wei-Shinn...
IAT
2007
IEEE
15 years 4 months ago
Formalizing Practical Reasoning Under Uncertainty: An Argumentation-Based Approach
Practical reasoning (PR), as advocated by philosophers is concerned by reasoning about what agents should do. It follows mainly two steps. A deliberation one for identifying the g...
Leila Amgoud, Henri Prade