Sciweavers

3404 search results - page 404 / 681
» C Programming Tutorial
Sort
View
114
Voted
CCS
2007
ACM
15 years 8 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros
139
Voted
TACAS
2007
Springer
108views Algorithms» more  TACAS 2007»
15 years 8 months ago
State of the Union: Type Inference Via Craig Interpolation
The ad-hoc use of unions to encode disjoint sum types in C programs and the inability of C’s type system to check the safe use of these unions is a long standing source of subtle...
Ranjit Jhala, Rupak Majumdar, Ru-Gang Xu
GLOBECOM
2006
IEEE
15 years 8 months ago
A Location-Based Vertical Handoff Decision Algorithm for Heterogeneous Mobile Networks
— Next-generation mobile communication systems will provide “always best connected” services to mobile users via cellular networks that provide wide area coverage for global ...
Jie Zhang, Henry C. B. Chan, Victor C. M. Leung
PPOPP
2006
ACM
15 years 8 months ago
High-performance IPv6 forwarding algorithm for multi-core and multithreaded network processor
IP forwarding is one of the main bottlenecks in Internet backbone routers, as it requires performing the longest-prefix match at 10Gbps speed or higher. IPv6 forwarding further ex...
Xianghui Hu, Xinan Tang, Bei Hua
SAC
2006
ACM
15 years 8 months ago
Making tuple spaces physical with RFID tags
In this paper, we describe the design and implementation of a tuple-based distributed memory realized with the use of RFID technology. The key idea – rooted in a more general sc...
Marco Mamei, Renzo Quaglieri, Franco Zambonelli