Sciweavers

17 search results - page 3 / 4
» Message from the Symposium Chairs
Sort
View
CHI
2002
ACM
14 years 8 months ago
CHI@20: fighting our way from marginality to power
The Special Interest Group on Computer Human Interaction (SIGCHI) has had a successful history of 20 years of growth in its numbers and influence. To help guide the continued evol...
Ben Shneiderman, Stuart K. Card, Donald A. Norman,...
FCT
1997
Springer
13 years 11 months ago
Trade-Off Results for Connection Management
A connection management protocol establishes a connection between two hosts across a wide-area network to allow reliable message delivery. Following previous work of Kleinberg et a...
Marios Mavronicolas, Nikos Papadakis
ISCOPE
1998
Springer
13 years 11 months ago
The Mobile Object Layer: A Run-Time Substrate for Mobile Adaptive Computations
In this paper we present a parallel runtime substrate that supports a global addressing scheme, object mobility, and automatic message forwarding required for the implementation o...
Nikos Chrisochoides, Kevin Barker, Démian N...
STOC
1995
ACM
107views Algorithms» more  STOC 1995»
13 years 11 months ago
Incremental cryptography and application to virus protection
The goal of incremental cryptography is to design cryptographic algorithms with the property that having applied the algorithm to a document, it is possible to quickly update the ...
Mihir Bellare, Oded Goldreich, Shafi Goldwasser
POPL
2000
ACM
13 years 12 months ago
Authentication Primitives and Their Compilation
Adopting a programming-language perspective, we study the problem of implementing authentication in a distributed system. We define a process calculus with constructs for authent...
Martín Abadi, Cédric Fournet, George...