Sciweavers

1116 search results - page 135 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
CONCUR
2010
Springer
13 years 9 months ago
A Geometric Approach to the Problem of Unique Decomposition of Processes
This paper proposes a geometric solution to the problem of prime decomposability of concurrent processes first explored by R. Milner and F. Moller in [MM93]. Concurrent programs ar...
Thibaut Balabonski, Emmanuel Haucourt
PERCOM
2008
ACM
13 years 7 months ago
An application framework for mobile, context-aware trails
In this paper 1 we describe the design, implementation and evaluation of a software framework that supports the development of mobile, context-aware trails-based applications. A t...
Cormac Driver, Siobhán Clarke
IJPP
2000
94views more  IJPP 2000»
13 years 7 months ago
Path Analysis and Renaming for Predicated Instruction Scheduling
Increases in instruction level parallelism are needed to exploit the potential parallelism available in future wide issue architectures. Predicated execution is an architectural m...
Lori Carter, Beth Simon, Brad Calder, Larry Carter...
CSFW
2007
IEEE
14 years 2 months ago
Security Analysis of Voice-over-IP Protocols
The transmission of voice communications as datagram packets over IP networks, commonly known as Voice-overIP (VoIP) telephony, is rapidly gaining wide acceptance. With private ph...
Prateek Gupta, Vitaly Shmatikov
SUTC
2006
IEEE
14 years 1 months ago
TARANTULAS: Mobility-enhanced Wireless Sensor-Actuator Networks
Amidst the numerous active research efforts in wireless sensor networks which aim to push beyond the limits, we aim to significantly enhance the effectiveness of wireless sensors ...
Winston Khoon Guan Seah, Kevin Z. Liu, Marcelo H. ...