Sciweavers

3424 search results - page 478 / 685
» Building Diverse Computer Systems
Sort
View
117
Voted
FSTTCS
2009
Springer
15 years 11 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
ISW
2009
Springer
15 years 11 months ago
MAC Precomputation with Applications to Secure Memory
We present ShMAC (Shallow MAC), a fixed input length message authentication code that performs most of the computation prior to the availability of the message. Specifically, Sh...
Juan A. Garay, Vladimir Kolesnikov, Rae McLellan
ENC
2008
IEEE
15 years 11 months ago
Adaptively Brokering Continuous Queries for Exploiting Streams
This paper introduces an approach for adaptively brokering queries for exploiting streams produced and consumed by devices with limited computing and storage capacities. Such devi...
José-Luis Zechinelli-Martini, Thierry Delot...
ACMACE
2005
ACM
15 years 10 months ago
Designing a narrative-based audio only 3D game engine
Immersing players in believable and engaging virtual environments is a common goal for many interactive computer games. While PC-based audio only games set in virtual worlds have ...
Timothy Roden, Ian Parberry
SIGCSE
2005
ACM
134views Education» more  SIGCSE 2005»
15 years 10 months ago
Enhancing team knowledge: instruction vs. experience
Information technology projects are growing in complexity and require teams to solve problems and develop solutions. With current undergraduate, computer science and information s...
Debra L. Smarkusky, Richard F. Dempsey, Joan J. Lu...