Sciweavers

3872 search results - page 609 / 775
» The Java memory model
Sort
View
SIGSOFT
2005
ACM
16 years 3 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
MOBIHOC
2004
ACM
16 years 1 months ago
Internal synchronization of drift-constraint clocks in ad-hoc sensor networks
Clock synchronization is a crucial basic service in typical sensor networks, since the observations of distributed sensors more often than not need to be ordered ("a happened...
Lennart Meier, Philipp Blum, Lothar Thiele
ICDAR
2009
IEEE
15 years 9 months ago
A Framework for Adaptation of the Active-DTW Classifier for Online Handwritten Character Recognition
: © A Framework for Adaptation of the Active-DTW Classifier for Online Handwritten Character Recognition Vandana Roy, Sriganesh Madhvanath, Anand S., Raghunath R. Sharma HP Labora...
Vandana Roy, Sriganesh Madhvanath, Anand S., Ragun...
PADS
2004
ACM
15 years 7 months ago
Space-Parallel Network Simulations Using Ghosts
We discuss an approach for creating a federated network simulation that eases the burdens on the simulator user that typically arise from more traditional methods for defining sp...
George F. Riley, Talal M. Jaafar, Richard M. Fujim...
SPAA
2004
ACM
15 years 7 months ago
Online algorithms for prefetching and caching on parallel disks
Parallel disks provide a cost effective way of speeding up I/Os in applications that work with large amounts of data. The main challenge is to achieve as much parallelism as poss...
Rahul Shah, Peter J. Varman, Jeffrey Scott Vitter