Sciweavers

2642 search results - page 116 / 529
» The development of Chez Scheme
Sort
View
IACR
2011
135views more  IACR 2011»
12 years 10 months ago
Charm: A framework for Rapidly Prototyping Cryptosystems
We describe Charm, an extensible framework designed for rapid prototyping of cryptographic systems that utilize the latest advances in cryptography, such as identity and attribute...
Joseph A. Akinyele, Matthew Green, Aviel D. Rubin
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
12 years 1 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
INFOCOM
2012
IEEE
12 years 1 months ago
BitTrickle: Defending against broadband and high-power reactive jamming attacks
—Reactive jamming is not only cost effective, but also hard to track and remove due to its intermittent jamming behaviors. Frequency Hopping Spread Spectrum (FHSS) and Direct Seq...
Yao Liu, Peng Ning
GPCE
2007
Springer
14 years 5 months ago
Debugging macros
Over the past two decades, Scheme macros have evolved into a powerful API for the compiler front-end. Like Lisp macros, their predecessors, Scheme macros expand source programs in...
Ryan Culpepper, Matthias Felleisen
ICSE
1993
IEEE-ACM
14 years 3 months ago
Expressing the Relationships Between Multiple Views in Requirements Specification
Composite systems generally comprise heterogeneous components whose specifications are developed by many development participants. The requirements of such systems are invariably ...
Bashar Nuseibeh, Jeff Kramer, Anthony Finkelstein