Sciweavers

1777 search results - page 267 / 356
» Programming Cryptographic Protocols
Sort
View
SOCO
2008
Springer
13 years 8 months ago
A Reflective Framework for Fine-Grained Adaptation of Aspect-Oriented Compositions
Dynamic Aspect Oriented Programming (AOP) technologies typically provide coarse-grained mechanisms for adapting aspects that cross-cut a system deployment; i.e. whole aspect module...
Paul Grace, Bert Lagaisse, Eddy Truyen, Wouter Joo...
IPPS
2010
IEEE
13 years 6 months ago
Operating system resource management
From the point of view of an operating system, a computer is managed and optimized in terms of the application programming model and the management of system resources. For the TF...
Burton Smith
IFIP
2010
Springer
13 years 3 months ago
Modeling Identity-Related Properties and Their Privacy Strength
In the last years several attempts to define identity-related properties such as identifiability, pseudonymity and anonymity have been made to analyze the privacy offered by inform...
Meilof Veeningen, Benne de Weger, Nicola Zannone
TON
2012
11 years 11 months ago
A Joint Approach to Routing Metrics and Rate Adaptation in Wireless Mesh Networks
—This work proposes MARA, a joint method for automatic rate selection and route quality evaluation in Wireless Mesh Networks. This method targets at avoiding the problem of inacc...
Diego G. Passos, Célio V. N. Albuquerque
CADE
2008
Springer
14 years 9 months ago
Towards SMT Model Checking of Array-Based Systems
Abstract. We introduce the notion of array-based system as a suittraction of infinite state systems such as broadcast protocols or sorting programs. By using a class of quantified-...
Silvio Ghilardi, Enrica Nicolini, Silvio Ranise, D...