Sciweavers

12183 search results - page 2362 / 2437
» Computers under Attacks!
Sort
View
ISER
1995
Springer
100views Robotics» more  ISER 1995»
15 years 3 months ago
Distributed Robotic Manipulation: Experiments in Minimalism
Minimalism pursues the following agenda: For a given robotics task, nd the minimal con guration of resources required to solve the task. Thus, minimalism attempts to reduce the re...
Karl-Friedrich Böhringer, Russell Brown, Bruc...
POPL
1995
ACM
15 years 3 months ago
Monad Transformers and Modular Interpreters
We show how a set of building blocks can be used to construct programming language interpreters, and present implementations of such building blocks capable of supporting many com...
Sheng Liang, Paul Hudak, Mark P. Jones
SIGLEX
1991
15 years 3 months ago
Aspectual Requirements of Temporal Connectives: Evidence for a Two-Level Approach to Semantics
This paper argues for a two-level theory of semantics as opposed to a one-level theory, based on the example of the system of temporal and durationM connectives. Instead of identi...
Michael Herweg
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
15 years 3 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar
CSFW
2010
IEEE
15 years 3 months ago
A Framework for the Sound Specification of Cryptographic Tasks
Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via the "trusted-party paradigm," where the protocol execution is compar...
Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou
« Prev « First page 2362 / 2437 Last » Next »