Sciweavers

18898 search results - page 3752 / 3780
» The Making of a Software Engineer
Sort
View
BIRTHDAY
2008
Springer
14 years 12 months ago
SPREADSPACES: Mathematically-Intelligent Graphical Spreadsheets
Abstract. Starting from existing spreadsheet software, like Lotus 1-23R , ExcelR , or Spreadsheet 2000R , we propose a sequence of enhancements to fully integrate constraint-based ...
Nachum Dershowitz, Claude Kirchner
CCS
2008
ACM
14 years 12 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi
CCS
2008
ACM
14 years 12 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
CCS
2008
ACM
14 years 12 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
IWMM
2010
Springer
211views Hardware» more  IWMM 2010»
14 years 12 months ago
Concurrent, parallel, real-time garbage-collection
With the current developments in CPU implementations, it becomes obvious that ever more parallel multicore systems will be used even in embedded controllers that require real-time...
Fridtjof Siebert
« Prev « First page 3752 / 3780 Last » Next »