Sciweavers

1777 search results - page 247 / 356
» Programming Cryptographic Protocols
Sort
View
IPSN
2009
Springer
14 years 3 months ago
Automating rendezvous and proxy selection in sensornets
As the diversity of sensornet use cases increases, the combinations of environments and applications that will coexist will make custom engineering increasingly impractical. We in...
David Chu, Joseph M. Hellerstein
CCGRID
2006
IEEE
14 years 2 months ago
VODCA: View-Oriented, Distributed, Cluster-Based Approach to Parallel Computing
This paper presents a high-performance Distributed Shared Memory system called VODCA, which supports a novel View-Oriented Parallel Programming on cluster computers. One advantage...
Zhiyi Huang, Wenguang Chen, Martin K. Purvis, Weim...
PLDI
2006
ACM
14 years 2 months ago
Continuations and transducer composition
On-line transducers are an important class of computational agent; we construct and compose together many software systems using them, such as stream processors, layered network p...
Olin Shivers, Matthew Might
ACSAC
2010
IEEE
13 years 6 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
POPL
2007
ACM
14 years 9 months ago
Specialization of CML message-passing primitives
Concurrent ML (CML) is a statically-typed higher-order concurrent language that is embedded in Standard ML. Its most notable feature is its support for first-class synchronous ope...
John H. Reppy, Yingqi Xiao