Sciweavers

487 search results - page 44 / 98
» Do Onboarding Programs Work
Sort
View
IPPS
2006
IEEE
14 years 1 months ago
Modeling and executing master-worker applications in component models
— This paper describes work in progress to extend component models to support Master-Worker applications and to let them to be executed on Grid infrastructures. The proposed appr...
Hinde-Lilia Bouziane, Christian Pérez, Thie...
ICALP
2005
Springer
14 years 1 months ago
Computationally Sound Implementations of Equational Theories Against Passive Adversaries
In this paper we study the link between formal and cryptographic models for security protocols in the presence of a passive adversary. In contrast to other works, we do not conside...
Mathieu Baudet, Véronique Cortier, Steve Kr...
ICALP
2005
Springer
14 years 1 months ago
Simple Extractors via Constructions of Cryptographic Pseudo-random Generators
Trevisan has shown that constructions of pseudo-random generators from hard functions (the Nisan-Wigderson approach) also produce extractors. We show that constructions of pseudo-r...
Marius Zimand
PPSWR
2005
Springer
14 years 1 months ago
Descriptive Typing Rules for Xcerpt
We present typing rules for the Web query language Xcerpt. The rules provide a descriptive type system: the typing of a program is an ation of its semantics. The rules can also be ...
Sacha Berger, Emmanuel Coquery, Wlodzimierz Draben...
HUC
2004
Springer
14 years 1 months ago
Rapid Authoring of Mediascapes
Ubiquitous computing promises to enable new classes of application. In this paper, we present research intended to accelerate the exploration of the space of possible application ...
Richard Hull 0002, Ben J. C. Clayton, Tom Melamed