Sciweavers

1156 search results - page 15 / 232
» The PENG System: Practice and Experience
Sort
View
SDMW
2005
Springer
15 years 4 months ago
Experiments with Queries over Encrypted Data Using Secret Sharing
To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an ...
Richard Brinkman, Berry Schoenmakers, Jeroen Doume...
CHI
2008
ACM
15 years 11 months ago
Understanding geocaching practices and motivations
Geocaching is a location-based activity that has been practiced for a number of years. As a sustained and established activity it represents an important opportunity for understan...
Kenton O'Hara
QUATIC
2007
IEEE
15 years 5 months ago
A Practical Model for Measuring Maintainability
—The amount of effort needed to maintain a software system is related to the technical quality of the source code of that system. The ISO 9126 model for software product quality ...
Ilja Heitlager, Tobias Kuipers, Joost Visser
HOTOS
2007
IEEE
15 years 2 months ago
Towards a Practical, Verified Kernel
In the paper we examine one of the issues in designing, specifying, implementing and formally verifying a small operating system kernel -- how to provide a productive and iterativ...
Kevin Elphinstone, Gerwin Klein, Philip Derrin, Ti...
HPDC
2002
IEEE
15 years 3 months ago
Error Scope on a Computational Grid: Theory and Practice
Error propagation is a central problem in grid computing. We re-learned this while adding a Java feature to the Condor computational grid. Our initial experience with the system w...
Douglas Thain, Miron Livny