Sciweavers

1777 search results - page 262 / 356
» Programming Cryptographic Protocols
Sort
View
CN
2002
96views more  CN 2002»
13 years 8 months ago
A transparent deployment method of RSVP-aware applications on UNIX
This paper proposes a method, called RLR (RSVP (Resource reSerVation Protocol) library redirection), which can transform legacy Internet applications into RSVP-aware applications ...
Yu-Ben Miao, Wen-Shyang Hwang, Ce-Kuen Shieh
COMSUR
2011
201views Hardware» more  COMSUR 2011»
12 years 8 months ago
Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions
— Vehicular networking has significant potential to enable diverse applications associated with traffic safety, traffic efficiency and infotainment. In this survey and tutorial p...
Georgios Karagiannis, Onur Altintas, Eylem Ekici, ...
TOOLS
2009
IEEE
14 years 3 months ago
Reusing and Composing Tests with Traits
Single inheritance often forces developers to duplicate code and logic. This widely recognized situation affects both business code and tests. In a large and complex application w...
Stéphane Ducasse, Damien Pollet, Alexandre ...
ASPLOS
2000
ACM
14 years 1 months ago
Architecture and design of AlphaServer GS320
This paper describes the architecture and implementation of the AlphaServer GS320, a cache-coherent non-uniform memory access multiprocessor developed at Compaq. The AlphaServer G...
Kourosh Gharachorloo, Madhu Sharma, Simon Steely, ...
DNA
2008
Springer
121views Bioinformatics» more  DNA 2008»
13 years 10 months ago
Isothermal Reactivating Whiplash PCR for Locally Programmable Molecular Computation
Whiplash PCR (WPCR), due to Hagiya et al. [1], is a novel technique for autonomous molecular computation where a state machine is implemented with a single stranded DNA molecule a...
John H. Reif, Urmi Majumder