Sciweavers

1175 search results - page 154 / 235
» Abstract computability and algebraic specification
Sort
View
JOC
2010
123views more  JOC 2010»
13 years 3 months ago
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Abstract. In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computati...
Yonatan Aumann, Yehuda Lindell
CADE
2009
Springer
14 years 9 months ago
Complexity of Fractran and Productivity
Abstract. In functional programming languages the use of infinite structures is common practice. For total correctness of programs dealing with infinite structures one must guarant...
Clemens Grabmayer, Dimitri Hendriks, Jörg End...
EWSN
2008
Springer
14 years 8 months ago
A Component Framework for Content-Based Publish/Subscribe in Sensor Networks
Component-based architectures are the traditional approach cile application specific optimization with reusable abstractions in sensor networks. However, they frequently overwhelm ...
Adam Wolisz, Andreas Köpke, Andreas Willig, J...
WISE
2009
Springer
14 years 6 months ago
Personalizing the Interface in Rich Internet Applications
Recently, existing design methodologies targeting traditional Web applications have been extended for Rich Internet Application modeling support. These extended methodologies curre...
Irene Garrigós, Santiago Meliá, Sven...
SIGCOMM
2009
ACM
14 years 3 months ago
A local knowledge base for service oriented access network selection
Service oriented access in a multi-application, multi-access network environment poses interesting research challenges. One of these challenges refers to cross-layer interoperabil...
Carolina Fortuna, Mihael Mohorcic