Sciweavers

1777 search results - page 214 / 356
» Programming Cryptographic Protocols
Sort
View
FORTE
2008
13 years 10 months ago
An SMT Approach to Bounded Reachability Analysis of Model Programs
Model programs represent transition systems that are used fy expected behavior of systems at a high level of abstraction. The main application area is application-level network pro...
Margus Veanes, Nikolaj Bjørner, Alexander R...
TOCS
2002
70views more  TOCS 2002»
13 years 8 months ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
PERCOM
2007
ACM
14 years 8 months ago
A State-Based Programming Model and System for Wireless Sensor Networks
Sensor networks are one important building block towards the realisation of context-aware applications. Suitable communication protocols and middleware solutions are necessary to ...
Urs Bischoff, Gerd Kortuem
WEBDB
1998
Springer
83views Database» more  WEBDB 1998»
14 years 1 months ago
On the Unification of Persistent Programming and the World Wide Web
In its infancy, the World-Wide Web consisted of a web of largely static hypertext documents. As time progresses it is evolving into a domain which supports almost arbitrary network...
Richard C. H. Connor, Keith Sibson, Paolo Manghi
ECOOP
2008
Springer
13 years 10 months ago
Session-Based Distributed Programming in Java
This paper demonstrates the impact of integrating session types and object-oriented programming, through their implementation in Java. Seses provide high-level abstraction for stru...
Raymond Hu, Nobuko Yoshida, Kohei Honda