Sciweavers

7839 search results - page 1385 / 1568
» What's there and what's not
Sort
View
ECOOP
2003
Springer
15 years 6 months ago
LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications
Despite Java’s automatic reclamation of memory, memory leaks remain an important problem. For example, we frequently encounter memory leaks that cause production servers to crash...
Nick Mitchell, Gary Sevitsky
EGOV
2003
Springer
15 years 6 months ago
Implementing e-Government in Spain
: New information and communication technologies within the Administration give rise to a series of important challenges: to select and use the various telematic and computer-relat...
José Luis Bermejo Latre
ESORICS
2003
Springer
15 years 6 months ago
Symmetric Authentication within a Simulatable Cryptographic Library
Abstract. Proofs of security protocols typically employ simple abstractions of cryptographic operations, so that large parts of such proofs pendent of cryptographic details. The ty...
Michael Backes, Birgit Pfitzmann, Michael Waidner
ESTIMEDIA
2003
Springer
15 years 6 months ago
Perception Coprocessors for Embedded Systems
Recognizing speech, gestures, and visual features are important interface capabilities for embedded mobile systems. Perception algorithms have many traits in common with more conv...
Binu K. Mathew, Al Davis, Ali Ibrahim
EUROCRYPT
2003
Springer
15 years 6 months ago
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications
ded abstract of this paper appears in Advances in Cryptology – EUROCRYPT ’03, Lecture Notes in Computer Science Vol. 2656, E. Biham ed., Springer-Verlag, 2003. This is the full...
Mihir Bellare, Tadayoshi Kohno
« Prev « First page 1385 / 1568 Last » Next »