Sciweavers

19003 search results - page 174 / 3801
» We Need Assurance!
Sort
View
APLAS
2007
ACM
14 years 2 months ago
Finally Tagless, Partially Evaluated
We have built the first family of tagless interpretations for a higher-order typed object language in a typed metalanguage (Haskell or ML) that require no dependent types, general...
Jacques Carette, Oleg Kiselyov, Chung-chieh Shan
ACSAC
2004
IEEE
14 years 2 months ago
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
Mudhakar Srivatsa, Ling Liu
CHES
2006
Springer
179views Cryptology» more  CHES 2006»
14 years 2 months ago
Offline Hardware/Software Authentication for Reconfigurable Platforms
Abstract. Many Field-Programmable Gate Array (FPGA) based systems utilize third-party intellectual property (IP) in their development. When they are deployed in non-networked envir...
Eric Simpson, Patrick Schaumont
FC
2006
Springer
108views Cryptology» more  FC 2006»
14 years 2 months ago
Uncheatable Reputation for Distributed Computation Markets
Reputation systems aggregate mutual feedback of interacting peers into a "reputation" metric for each participant. This is then available to prospective service "req...
Bogdan Carbunar, Radu Sion
ACSAC
2001
IEEE
14 years 2 months ago
Information Flow Analysis of Component-Structured Applications
Software component technology facilitates the costeffective development of specialized applications. Nevertheless, due to the high number of principals involved in a component-str...
Peter Herrmann