Sciweavers

1777 search results - page 310 / 356
» Programming Cryptographic Protocols
Sort
View
PERCOM
2008
ACM
14 years 8 months ago
MAGIC Broker: A Middleware Toolkit for Interactive Public Displays
Large screen displays are being increasingly deployed in public areas for advertising, entertainment, and information display. Recently we have witnessed increasing interest in su...
Aiman Erbad, Michael Blackstock, Adrian Friday, Ro...
MOBISYS
2003
ACM
14 years 8 months ago
Collaboration and Multimedia Authoring on Mobile Devices
This paper introduces adaptation-aware editing and progressive update propagation, two novel mechanisms that enable authoring multimedia content and collaborative work on mobile d...
Eyal de Lara, Rajnish Kumar, Dan S. Wallach, Willy...
SOSP
2009
ACM
14 years 5 months ago
Surviving sensor network software faults
We describe Neutron, a version of the TinyOS operating system that efficiently recovers from memory safety bugs. Where existing schemes reboot an entire node on an error, Neutron...
Yang Chen, Omprakash Gnawali, Maria A. Kazandjieva...
EDBTW
2010
Springer
14 years 3 months ago
Toward a software development methodology for anonymity applications
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shari...
ICALP
2009
Springer
14 years 3 months ago
Quasirandom Rumor Spreading: Expanders, Push vs. Pull, and Robustness
Abstract Randomized rumor spreading is an efficient protocol to distribute information in networks. Recently, a quasirandom version has been proposed and proven to work equally we...
Benjamin Doerr, Tobias Friedrich, Thomas Sauerwald