Sciweavers

1777 search results - page 224 / 356
» Programming Cryptographic Protocols
Sort
View
TOOLS
2008
IEEE
14 years 3 months ago
Modeling of Component Environment in Presence of Callbacks and Autonomous Activities
Abstract. A popular approach to compositional verification of component-based applications is based on the assume-guarantee paradigm, where an assumption models behavior of an env...
Pavel Parizek, Frantisek Plasil
SOCO
2005
Springer
14 years 2 months ago
Stateful Aspects in JAsCo
Aspects that trigger on a sequence of join points instead of on a single join point are not explicitly supported in current AspectOriented approaches. Explicit protocols are howeve...
Wim Vanderperren, Davy Suvée, María ...
ASPLOS
2000
ACM
14 years 1 months ago
Evaluating Design Alternatives for Reliable Communication on High-Speed Networks
We systematically evaluate the performance of five implementations of a single, user-level communication interface. Each implementation makes different architectural assumptions ...
Raoul Bhoedjang, Kees Verstoep, Tim Rühl, Hen...
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
14 years 3 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee
PERCOM
2007
ACM
14 years 8 months ago
MundoCore: A light-weight infrastructure for pervasive computing
MundoCore is a communication middleware specifically designed for the requirements of pervasive computing. To address the high degree of heterogeneity of platforms and networking ...
Erwin Aitenbichler, Jussi Kangasharju, Max Mühlh...