Sciweavers

248 search results - page 30 / 50
» Authentication Primitives and Their Compilation
Sort
View
POPL
2008
ACM
15 years 10 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
SIGSOFT
2004
ACM
15 years 10 months ago
Implementing protocols via declarative event patterns
This paper introduces declarative event patterns (DEPs) as a means to implement protocols while improving their traceability, comprehensibility, and maintainability. DEPs are desc...
Robert J. Walker, Kevin Viggers
ICFP
2005
ACM
15 years 10 months ago
A principled approach to operating system construction in Haskell
We describe a monadic interface to low-level hardware features that is a suitable basis for building operating systems in Haskell. The interface includes primitives for controllin...
Thomas Hallgren, Mark P. Jones, Rebekah Leslie, An...
CCGRID
2003
IEEE
15 years 3 months ago
An Exposed Approach to Reliable Multicast in Heterogeneous Logistical Networks
An exposed approach in computer service architecture is one that offers client software a primitive service whose semantics are closely based on the underlying physical infrastruc...
Micah Beck, Ying Ding 0002, Erika Fuentes, Sharmil...
CVPR
2012
IEEE
13 years 11 days ago
Sum-product networks for modeling activities with stochastic structure
This paper addresses recognition of human activities with stochastic structure, characterized by variable spacetime arrangements of primitive actions, and conducted by a variable ...
Mohamed R. Amer, Sinisa Todorovic