Sciweavers

162 search results - page 22 / 33
» A note on an extension of PDL
Sort
View
FC
2001
Springer
123views Cryptology» more  FC 2001»
15 years 4 months ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath
APCHI
1998
IEEE
15 years 4 months ago
Tickertape: Notification and Communication in a Single Line
This paper outlines an awareness application called Tickertape. Tickertape is a tool that displays event notifications in the form of scrolling messages across a single-line windo...
Sara Parsowith, Geraldine Fitzpatrick, Simon M. Ka...
CONCUR
2007
Springer
15 years 3 months ago
Temporal Antecedent Failure: Refining Vacuity
We re-examine vacuity in temporal logic model checking. We note two disturbing phenomena in recent results in this area. The first indicates that not all vacuities detected in prac...
Shoham Ben-David, Dana Fisman, Sitvanit Ruah
CONEXT
2007
ACM
15 years 3 months ago
Near-optimal co-ordinated coding in wireless multihop networks
The recent work on COPE by Katti et al. demonstrates a practical application of network coding to wireless multihop networks. We note, however, that the opportunistic nature of CO...
Björn Scheuermann, Wenjun Hu, Jon Crowcroft
ECOOP
2007
Springer
15 years 3 months ago
Non-null References by Default in Java: Alleviating the Nullity Annotation Burden
With the advent of Java 5 annotations, we note a marked increase in the availability of tools that can statically detect potential null dereferences. For such tools to be truly eff...
Patrice Chalin, Perry R. James