Sciweavers

1477 search results - page 4 / 296
» Token flow control
Sort
View
TCC
2009
Springer
114views Cryptology» more  TCC 2009»
14 years 10 months ago
Predicate Privacy in Encryption Systems
Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generat...
Emily Shen, Elaine Shi, Brent Waters
SSS
2009
Springer
14 years 2 months ago
Efficient Robust Storage Using Secret Tokens
Dan Dobre, Matthias Majuntke, Marco Serafini, Neer...
DAC
2007
ACM
14 years 10 months ago
Synchronous Elastic Circuits with Early Evaluation and Token Counterflow
A protocol for latency-insensitive design with early evaluation is presented. The protocol is based on a symmetric view of the system in which tokens carrying information move in ...
Jordi Cortadella, Michael Kishinevsky
IPSN
2005
Springer
14 years 3 months ago
Building up to macroprogramming: an intermediate language for sensor networks
Abstract— There is widespread agreement that a higher level programming model for sensor networks is needed. A variety of models have been developed, but the community is far fro...
Ryan Newton, Arvind, Matt Welsh
ESTIMEDIA
2008
Springer
13 years 11 months ago
Translating data flow to synchronous block diagrams
We propose a method to automatically transform synchronous data flow diagrams into synchronous block diagrams. The idea is to use triggers, a mechanism that allows a block to be f...
Roberto Lublinerman, Stavros Tripakis