Sciweavers

3424 search results - page 112 / 685
» Building Diverse Computer Systems
Sort
View
POPL
2008
ACM
14 years 8 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
TWC
2008
150views more  TWC 2008»
13 years 7 months ago
Design and analysis of post-coded OFDM systems
This paper discusses the design and analysis of post coded OFDM (PC-OFDM) systems. Coded or precoded OFDM systems are generally employed to overcome the symbol recovery problem in...
S. F. A. Shah, Ahmed H. Tewfik
SAC
2009
ACM
14 years 17 days ago
Using a product line for creating component systems
Component systems have become a wide-spread technology and found their place in several application domains. Each component system has its speciļ¬cs and particularities that reļ¬...
Tomás Bures, Petr Hnetynka, Michal Malohlav...
IPPS
2007
IEEE
14 years 2 months ago
RNAVLab: A unified environment for computational RNA structure analysis based on grid computing technology
Ribonucleic acid (RNA) molecules play important roles in many biological processes including gene expression and regulation. An RNA molecule is a linear polymer which folds back o...
Michela Taufer, Ming-Ying Leung, Kyle L. Johnson, ...
CCS
2006
ACM
13 years 11 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...