Sciweavers

3821 search results - page 672 / 765
» A Security Model for Aglets
Sort
View
VL
2000
IEEE
120views Visual Languages» more  VL 2000»
15 years 5 months ago
Visualizing the Synchronization of Java-Threads with UML
Concurrent programming is a complex task, even with modern languages such as Java who provide languagebased support for multithreading and synchronization. In addition to typical ...
Katharina Mehner, Annika Wagner
103
Voted
POPL
1999
ACM
15 years 5 months ago
Type-Safe Linking and Modular Assembly Language
Linking is a low-level task that is usually vaguely specified, if at all, by language definitions. However, the security of web browsers and other extensible systems depends cru...
Neal Glew, J. Gregory Morrisett
HPDC
1998
IEEE
15 years 5 months ago
Authorization for Metacomputing Applications
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved ...
G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman
104
Voted
ISARCS
2010
141views Hardware» more  ISARCS 2010»
15 years 4 months ago
Integrating Fault-Tolerant Techniques into the Design of Critical Systems
Abstract. Software designs equipped with specification of dependability techniques can help engineers to develop critical systems. In this work, we start to envision how a softwar...
Ricardo J. Rodríguez, José Merseguer
110
Voted
ACSC
2004
IEEE
15 years 4 months ago
Establishing Trust In Pure Ad-hoc Networks
An ad-hoc network of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. It is also often termed an infrastructure-less, self-or...
Asad Amir Pirzada, Chris McDonald