Sciweavers

537 search results - page 65 / 108
» Compiling Exceptions Correctly
Sort
View
NDSS
2003
IEEE
14 years 2 months ago
Proxy Cryptography Revisited
In this work we revisit and formally study the notion of proxy cryptography. Intuitively, various proxy functions allow two cooperating parties F (the “FBI”) and P (the “pro...
Anca-Andreea Ivan, Yevgeniy Dodis
ISCC
2002
IEEE
14 years 1 months ago
Resource and performance management in wireless communication networks
In this paper, we study the problems of resource and performance management in channelized wireless networks. For identifying research issues systematically, we propose a research...
Chih-Hao Lin, Frank Yeong-Sung Lin
CLUSTER
2009
IEEE
14 years 1 months ago
Finding a tradeoff between host interrupt load and MPI latency over Ethernet
—Achieving high-performance message passing on top of generic ETHERNET hardware suffers from the NIC interruptdriven model where coalescing is usually involved. We present an in-...
Brice Goglin, Nathalie Furmento
ECSQARU
2001
Springer
14 years 1 months ago
How to Reason Credulously and Skeptically within a Single Extension
Abstract. Consistency-based approaches in nonmonotonic reasoning may be expected to yield multiple sets of default conclusions for a given default theory. Reasoning about such exte...
James P. Delgrande, Torsten Schaub
POPL
1999
ACM
14 years 1 months ago
JFlow: Practical Mostly-Static Information Flow Control
A promising technique for protecting privacy and integrity of sensitive data is to statically check information flow within programs that manipulate the data. While previous work...
Andrew C. Myers