Sciweavers

3815 search results - page 50 / 763
» An Implementation of Session Types
Sort
View
ISDA
2006
IEEE
14 years 1 months ago
Efficient Multiplier over Finite Field Represented in Type II Optimal Normal Basis
- Elliptic curve cryptography plays a crucial role in networking and information security area, and modular multiplication arithmetic over finite field is a necessary computation p...
Youbo Wang, Zhiguang Tian, Xinyan Bi, Zhendong Niu
ASE
2010
77views more  ASE 2010»
13 years 8 months ago
Type safety for feature-oriented product lines
A feature-oriented product line is a family of programs that share a common set of features. A feature implements a stakeholder's requirement and represents a design deci
Sven Apel, Christian Kästner, Armin Grö&...
IPPS
2007
IEEE
14 years 2 months ago
Machine Bank: Own Your Virtual Personal Computer
In this paper, we report the design, implementation and experimental results of Machine Bank, a system engineered towards the popular shared-lab scenario, where users outnumber av...
Shuo Tang, Yu Chen, Zheng Zhang
DFN
2004
13 years 9 months ago
SIP Security
: Ubiquitous worldwide broadband Internet access as well the coming of age of VoIP technology have made Voice-over-IP an increasingly attractive and useful network application. Cur...
Andreas Steffen, Daniel Kaufmann, Andreas Stricker
IJMMS
2006
84views more  IJMMS 2006»
13 years 7 months ago
Identity and role - A qualitative case study of cooperative scenario building
In this study, we argue that users participating in the design process will form the participation as a function of their professional role, but also as a function of their identi...
David Dinka, Jonas Lundberg