Sciweavers

141 search results - page 16 / 29
» DrScheme: a programming environment for Scheme
Sort
View
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
15 years 3 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya
CAV
2003
Springer
188views Hardware» more  CAV 2003»
15 years 1 months ago
Thread-Modular Abstraction Refinement
odular Abstraction Refinement Thomas A. Henzinger1 , Ranjit Jhala1 , Rupak Majumdar1 , and Shaz Qadeer2 1 University of California, Berkeley 2 Microsoft Research, Redmond Abstract....
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar,...
76
Voted
ICCS
2003
Springer
15 years 2 months ago
JDOS: A Jini Based Distributed Operating System
J-DOS provides and integrated JAVA environment for the execution of a program across an interconnected network of heterogeneous computers. The system provides a file system, shar...
M. Saywell, J. S. Reeve
IFIP
2003
Springer
15 years 2 months ago
Self-Organising Node Address Management in Ad Hoc Networks
Whilst much effort has been put into the creation of routing algorithms to handle all sorts of mobility scenarios in ad-hoc networks, other fundamental issues, such as the addresse...
Stephen Toner, Donal O'Mahony
JSW
2006
56views more  JSW 2006»
14 years 9 months ago
Evolutionary Computing for Detection of Retentive Structures in Coastal Waters
The demography of anchovy fishes in the Gulf of Biscay seems to be related to the presence of socalled "retentive" hydrodynamical structures, that keep fish eggs and larv...
Marc Segond, Denis Robilliard, Virginie Marion-Pot...