Sciweavers

258 search results - page 51 / 52
» Securing Provenance
Sort
View
OOPSLA
2004
Springer
14 years 1 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
ICALP
2010
Springer
14 years 15 days ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao
ICDCS
2010
IEEE
13 years 11 months ago
Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing
—Wireless communication is particularly vulnerable to signal jamming attacks. Spread spectrum mitigates such problem by spreading normal narrowband signals over a much wider band...
Qi Dong, Donggang Liu
ICFP
2010
ACM
13 years 8 months ago
A certified framework for compiling and executing garbage-collected languages
We describe the design, implementation, and use of a machinecertified framework for correct compilation and execution of programs in garbage-collected languages. Our framework ext...
Andrew McCreight, Tim Chevalier, Andrew P. Tolmach
BMCBI
2007
152views more  BMCBI 2007»
13 years 7 months ago
PASSIM - an open source software system for managing information in biomedical studies
Background: One of the crucial aspects of day-to-day laboratory information management is collection, storage and retrieval of information about research subjects and biomedical s...
Juris Viksna, Edgars Celms, Martins Opmanis, Karli...