Sciweavers

169 search results - page 5 / 34
» From Operating-System Correctness to Pervasively Verified Ap...
Sort
View
MOBIDE
2006
ACM
14 years 4 months ago
Towards correcting input data errors probabilistically using integrity constraints
Mobile and pervasive applications frequently rely on devices such as RFID antennas or sensors (light, temperature, motion) to provide them information about the physical world. Th...
Nodira Khoussainova, Magdalena Balazinska, Dan Suc...
CBSE
2004
Springer
14 years 4 months ago
Correctness of Component-Based Adaptation
Abstract. Long running applications often need to adapt due to changing requirements or changing environment. Typically, such adaptation is performed by dynamically adding or remov...
Sandeep S. Kulkarni, Karun N. Biyani
INFOCOM
2003
IEEE
14 years 3 months ago
Path Diversity with Forward Error Correction (PDF) System for Delay Sensitive Applications over the Internet
— Packet loss and end-to-end delay limit delay sensitive applications over the best effort packet switched networks such as the Internet. In our previous work, we have shown that...
Thinh Nguyen
CCS
2001
ACM
14 years 2 months ago
A verifiable secret shuffle and its application to e-voting
We present a mathematical construct which provides a cryptographic protocol to verifiably shuffle a sequence of k modular integers, and discuss its application to secure, universa...
C. Andrew Neff
MIDDLEWARE
2004
Springer
14 years 4 months ago
GridBox: securing hosts from malicious and greedy applications
Security is an important concern in providing the infrastructure for the implementation of general purpose computational grids. However, most grid implementations focus their secu...
Evgueni Dodonov, Joelle Quaini Sousa, Hélio...