Sciweavers

750 search results - page 75 / 150
» Program Chair's Message
Sort
View
IACR
2011
104views more  IACR 2011»
12 years 9 months ago
Collusion Resistant Obfuscation and Functional Re-encryption
Program Obfuscation is the problem of transforming a program into one which is functionally equivalent, yet whose inner workings are completely unintelligible to an adversary. Des...
Nishanth Chandran, Melissa Chase, Vinod Vaikuntana...
WWW
2009
ACM
14 years 10 months ago
Privacy preserving frequency capping in internet banner advertising
We describe an optimize-and-dispatch approach for delivering pay-per-impression advertisements in online advertising. The platform provider for an advertising network commits to s...
Ayman Farahat
POPL
2005
ACM
14 years 10 months ago
Inferring authentication tags
We present PEAR (Protocol Extendable AnalyzeR), a tool automating the two static analyses for authentication protocols presented in [7, 8]. These analyses are based on a tagging s...
Riccardo Focardi, Matteo Maffei, Francesco Placell...
HOTI
2008
IEEE
14 years 4 months ago
A Network Fabric for Scalable Multiprocessor Systems
Much of high performance technical computing has moved from shared memory architectures to message based cluster systems. The development and wide adoption of the MPI parallel pro...
Nitin Godiwala, Jud Leonard, Matthew Reilly
IPPS
2007
IEEE
14 years 4 months ago
Using Coroutines for RPC in Sensor Networks
This paper proposes a concurrency model which integrates the asynchronous and event-driven nature of wireless etworks with higher-level abstractions that provide a more familiar p...
Marcelo Cohen, Thiago Ponte, Silvana Rossetto, Noe...