Sciweavers

3378 search results - page 619 / 676
» A universe of binding and computation
Sort
View
ADHOCNETS
2009
Springer
15 years 4 days ago
Efficient Distribution of Large Files in UMTS Supported by Network Coded M2M Data Transfer with Multiple Generations
This paper is a sequel of previous work, in which we have studied the traffic management problem in UMTS. The main objective was to improve the spectral efficiency of cellular netw...
Larissa Popova, Wolfgang H. Gerstacker, Wolfgang K...
CCS
2008
ACM
14 years 11 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...
ECOOPW
2008
Springer
14 years 11 months ago
Getting Farther on Software Evolution via AOP and Reflection
Following last four years' RAM-SE (Reflection, AOP and Meta-Data for Software Evolution) workshop at the ECOOP conference, the RAM-SE'08 workshop was a successful and pop...
Manuel Oriol, Walter Cazzola, Shigeru Chiba, Gunte...
ELPUB
2008
ACM
14 years 11 months ago
AudioKrant, the daily spoken newspaper
Being subscribed to a newspaper, readers expect some basic things: receiving their paper in their mailbox early in the morning, being able to read it privately when and where they...
Bert Paepen
IMC
2007
ACM
14 years 11 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...