Sciweavers

1477 search results - page 4 / 296
» Token flow control
Sort
View
103
Voted
TCC
2009
Springer
114views Cryptology» more  TCC 2009»
16 years 3 months ago
Predicate Privacy in Encryption Systems
Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generat...
Emily Shen, Elaine Shi, Brent Waters
77
Voted
SSS
2009
Springer
15 years 7 months ago
Efficient Robust Storage Using Secret Tokens
Dan Dobre, Matthias Majuntke, Marco Serafini, Neer...
98
Voted
DAC
2007
ACM
16 years 3 months ago
Synchronous Elastic Circuits with Early Evaluation and Token Counterflow
A protocol for latency-insensitive design with early evaluation is presented. The protocol is based on a symmetric view of the system in which tokens carrying information move in ...
Jordi Cortadella, Michael Kishinevsky
IPSN
2005
Springer
15 years 8 months ago
Building up to macroprogramming: an intermediate language for sensor networks
Abstract— There is widespread agreement that a higher level programming model for sensor networks is needed. A variety of models have been developed, but the community is far fro...
Ryan Newton, Arvind, Matt Welsh
ESTIMEDIA
2008
Springer
15 years 4 months ago
Translating data flow to synchronous block diagrams
We propose a method to automatically transform synchronous data flow diagrams into synchronous block diagrams. The idea is to use triggers, a mechanism that allows a block to be f...
Roberto Lublinerman, Stavros Tripakis