Sciweavers

2162 search results - page 385 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
CHI
2003
ACM
14 years 10 months ago
Navigating in a mobile XHTML application
The Internet has been a great success in the fixed world, whereas WAP (Wireless Application Protocol), the mobile Internet, has not fulfilled its promise. However, now the analyst...
Anne Kaikkonen, Virpi Roto
POPL
2005
ACM
14 years 10 months ago
From sequential programs to multi-tier applications by program transformation
Modern applications are designed in multiple tiers to separate concerns. Since each tier may run at a separate location, middleware is required to mediate access between tiers. Ho...
Matthias Neubauer, Peter Thiemann
STOC
2005
ACM
110views Algorithms» more  STOC 2005»
14 years 10 months ago
Key agreement from weak bit agreement
Assume that Alice and Bob, given an authentic channel, have a protocol where they end up with a bit SA and SB, respectively, such that with probability 1+ 2 these bits are equal. ...
Thomas Holenstein
SIGMOD
2005
ACM
74views Database» more  SIGMOD 2005»
14 years 10 months ago
Online B-tree Merging
Many scenarios involve merging of two B-tree indexes, both covering the same key range. Increasing demand for continuous availability and high performance requires that such mergi...
Xiaowei Sun, Rui Wang 0002, Betty Salzberg, Chendo...
ICSE
2004
IEEE-ACM
14 years 10 months ago
A Feature-Oriented Alternative to Implementing Reliability Connector Wrappers
Connectors and connector wrappers explicitly specify the protocol of interaction among components and afford the reusable application of extra-functional behaviors, such as reliabi...
J. H. Sowell, R. E. Kurt Stirewalt