Sciweavers

2416 search results - page 68 / 484
» The design and implementation of typed scheme
Sort
View
ESOP
2008
Springer
13 years 10 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...
DCC
2010
IEEE
14 years 3 months ago
A Flexible Multiple Description Coding Scheme Based on Rateless Codes
The multiple description coding of an independent and identically distributed Gaussian source over bit error channels is considered. A novel practical multiple description coding ...
Ozgun Y. Bursalioglu, Giuseppe Caire
ISPA
2005
Springer
14 years 2 months ago
ER-TCP: An Efficient Fault-Tolerance Scheme for TCP Connections
Abstract. This paper proposes a novel scheme, named ER-TCP, which transparently masks the failures happened on the server nodes in a cluster from clients at TCP connection granular...
Zhiyuan Shao, Hai Jin, Bin Cheng, Wenbin Jiang
POPL
2007
ACM
14 years 9 months ago
A concurrent constraint handling rules implementation in Haskell with software transactional memory
Constraint Handling Rules (CHR) is a concurrent committedchoice constraint logic programming language to describe transformations (rewritings) among multi-sets of constraints (ato...
Edmund S. L. Lam, Martin Sulzmann
CISIS
2009
IEEE
14 years 3 months ago
A Lightweight Implementation of Trusted Domain Enforcement for Secure Embedded Web Server
—Deployment of open source software for embedded system is increasing while ubiquitous devices have become widely used. System designer need to cope with malicious input which is...
Ruo Ando