Sciweavers

3979 search results - page 756 / 796
» Wild control operators
Sort
View
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
15 years 2 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
SIGCOMM
2000
ACM
15 years 2 months ago
Delayed internet routing convergence
This paper examines the latency in Internet path failure, failover and repair due to the convergence properties of interdomain routing. Unlike switches in the public telephony net...
Craig Labovitz, Abha Ahuja, Abhijit Bose, Farnam J...
AGENTS
2000
Springer
15 years 2 months ago
MAS Infrastructure: Definitions, Needs and Prospects
This paper attempts to articulate the general role of infrastructure for multi-agent systems (MAS), and why infrastructure is a particularly critical issue if we are to increase th...
Les Gasser
NPIV
1999
ACM
142views Visualization» more  NPIV 1999»
15 years 2 months ago
ALMOST: Exploring Program Traces
We built a tool to visualize and explore program execution traces. Our goal was to help programmers without any prior knowledge of a program, quickly get enough knowledge about it...
Manos Reniers, Steven P. Reis
EH
1999
IEEE
169views Hardware» more  EH 1999»
15 years 2 months ago
GeneticFPGA: Evolving Stable Circuits on Mainstream FPGA Devices
GeneticFPGA is a Java-based tool for evolving digital circuits on Xilinx XC4000EXTM and XC4000XLTM devices. Unlike other FPGA architectures popular with Evolutionary Hardware rese...
Delon Levi, Steve Guccione