Sciweavers

4305 search results - page 597 / 861
» Analysing Protocol Implementations
Sort
View
OOPSLA
1990
Springer
15 years 8 months ago
Exception Handling and Object-Oriented Programming: Towards a Synthesis
The paper presents a discussion and a specification of an exception handling system dedicated to object-oriented programming. We show how a full object-oriented representation of ...
Christophe Dony
AOSD
2007
ACM
15 years 8 months ago
Expressive programs through presentation extension
Most approaches to programming language extensibility have worked by pairing syntactic extension with semantic extension. We present an approach that works through a combination o...
Andrew David Eisenberg, Gregor Kiczales
CONEXT
2007
ACM
15 years 8 months ago
ER: efficient retransmission scheme for wireless LANs
Wireless LANs (WLANs) have been deployed at a remarkable rate at university campuses, office buildings, airports, hotels, and malls. Providing efficient and reliable wireless comm...
Eric Rozner, Anand Padmanabha Iyer, Yogita Mehta, ...
COMPSAC
2009
IEEE
15 years 8 months ago
Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks
Delay and disruption tolerant networks (DTNs) can bring much-needed networking capabilities to developing countries and rural areas. DTN features such as high node mobility and in...
Karim M. El Defrawy, John Solis, Gene Tsudik
FC
2010
Springer
163views Cryptology» more  FC 2010»
15 years 8 months ago
A Traceability Attack against e-Passports
Since 2004, many nations have started issuing “e-passports” containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secur...
Tom Chothia, Vitaliy Smirnov