Sciweavers

14165 search results - page 2791 / 2833
» The generalized two-server problem
Sort
View
JOT
2008
153views more  JOT 2008»
15 years 1 months ago
I Resign: Resigning Jar Files with Initium
This paper describes how to resign Jar files. Jar files (Java archives) are used by technologies (like Java Web Start) to deploy applications that are run with increased privilege...
Douglas Lyon
DAM
2007
107views more  DAM 2007»
15 years 1 months ago
Eliminating graphs by means of parallel knock-out schemes
In 1997 Lampert and Slater introduced parallel knock-out schemes, an iterative process on graphs that goes through several rounds. In each round of this process, every vertex elim...
Hajo Broersma, Fedor V. Fomin, Rastislav Kralovic,...
JCP
2006
90views more  JCP 2006»
15 years 1 months ago
Using LDA Method to Provide Mobile Location Estimation Services within a Cellular Radio Network
Abstract-- Mobile location estimation is becoming an important value-added service for a mobile phone operator. It is well-known that GPS can provide an accurate location estimatio...
Junyang Zhou, Joseph Kee-Yin Ng
JUCS
2008
113views more  JUCS 2008»
15 years 1 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
JFP
2006
78views more  JFP 2006»
15 years 1 months ago
Sound and complete models of contracts
Even in statically typed languages it is useful to have certain invariants checked dynamically. Findler and Felleisen gave an algorithm for dynamically checking expressive highero...
Matthias Blume, David A. McAllester
« Prev « First page 2791 / 2833 Last » Next »