Sciweavers

1855 search results - page 84 / 371
» A coding theorem for distributed computation
Sort
View
112
Voted
CONCUR
2000
Springer
15 years 4 months ago
Typed Mobile Objects
We describe a general model for embedding object-oriented constructs into calculi of mobile agents. The model results from extending agents with methods and primitives for message ...
Michele Bugliesi, Giuseppe Castagna, Silvia Crafa
PDCAT
2004
Springer
15 years 6 months ago
Tamper Resistant Software by Integrity-Based Encryption
There are many situations in which it is desirable to protect a piece of software from illegitimate tampering once it gets distributed to the users. Protecting the software code me...
Jaewon Lee, Heeyoul Kim, Hyunsoo Yoon
141
Voted
IMC
2006
ACM
15 years 6 months ago
Comprehensive view of a live network coding P2P system
In this paper we present the first implementation of a P2P content distribution system that uses Network Coding. Using results from live trials with several hundred nodes, we pro...
Christos Gkantsidis, John Miller, Pablo Rodriguez
114
Voted
CADE
2000
Springer
15 years 4 months ago
Machine Instruction Syntax and Semantics in Higher Order Logic
Abstract. Proof-carrying code and other applications in computer security require machine-checkable proofs of properties of machine-language programs. These in turn require axioms ...
Neophytos G. Michael, Andrew W. Appel
121
Voted
SPAA
2003
ACM
15 years 5 months ago
The effect of communication costs in solid-state quantum computing architectures
Quantum computation has become an intriguing technology with which to attack difficult problems and to enhance system security. Quantum algorithms, however, have been analyzed un...
Dean Copsey, Mark Oskin, Tzvetan S. Metodi, Freder...