Sciweavers

56 search results - page 4 / 12
» An Update Operator for Strategic Ability
Sort
View
CCS
2001
ACM
13 years 10 months ago
Delegation of cryptographic servers for capture-resilient devices
Abstract. A device that performs private key operations (signatures or decryptions), and whose private key operations are protected by a password, can be immunized against offline...
Philip D. MacKenzie, Michael K. Reiter
ESOP
2000
Springer
13 years 9 months ago
Alias Types
Abstract. Linear type systems allow destructive operations such as object deallocation and imperative updates of functional data structures. These operations and others, such as th...
Frederick Smith, David Walker, J. Gregory Morriset...
TON
2010
158views more  TON 2010»
13 years 4 months ago
Always acyclic distributed path computation
Abstract—Distributed routing algorithms may give rise to transient loops during path recomputation, which can pose significant stability problems in high-speed networks. We pres...
Saikat Ray, Roch Guérin, Kin Wah Kwong, Rut...
ICDCN
2009
Springer
14 years 27 days ago
Tracking Dynamics Using Sensor Networks: Some Recurring Themes
Abstract. Much of the data consumed today is dynamic, typically gathered from distributed sources including sensors, and used in real-time monitoring and decision making applicatio...
Krithi Ramamritham
HICSS
2008
IEEE
146views Biometrics» more  HICSS 2008»
14 years 18 days ago
Exploring E-Commerce Readiness in China: The Case of the Grocery Industry
Electronic Commerce which enables business transactions to be conducted electronically has demonstrated significant operational and strategic benefits. Developed countries have ac...
Sherah Kurnia