Sciweavers

361 search results - page 40 / 73
» Composition of Password-Based Protocols
Sort
View
WWW
2005
ACM
14 years 9 months ago
A service creation environment based on end to end composition of Web services
The demand for quickly delivering new applications is increasingly becoming a business imperative today. Application development is often done in an ad hoc manner, without standar...
Vikas Agarwal, Koustuv Dasgupta, Neeran M. Karnik,...
NORDICHI
2006
ACM
14 years 2 months ago
Active surfaces: a novel concept for end-user composition
This paper describes the design process of a modular system for supporting physical and cognitive rehabilitation in the swimming pool. In such an environment, the therapist is cal...
Erik Grönvall, Patrizia Marti, Alessandro Pol...
EMSOFT
2009
Springer
14 years 3 months ago
Compositional deadlock detection for rendezvous communication
Concurrent programming languages are growing in importance with the advent of multi-core systems. However, concurrent programs suffer from problems, such as data races and deadloc...
Baolin Shao, Nalini Vasudevan, Stephen A. Edwards
MFCS
1995
Springer
14 years 7 days ago
An Abstract Account of Composition
act Account of Composition Mart n Abadi1 and Stephan Merz2 1 Digital Equipment Corporation, Systems Research Center, 130 Lytton Avenue, Palo Alto, CA 94301, U.S.A. 2 Institut fur I...
Martín Abadi, Stephan Merz
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
14 years 11 days ago
On Expected Constant-Round Protocols for Byzantine Agreement
In a seminal paper, Feldman and Micali (STOC '88) show an n-party Byzantine agreement protocol tolerating t < n/3 malicious parties that runs in expected constant rounds. H...
Jonathan Katz, Chiu-Yuen Koo