Sciweavers

2777 search results - page 421 / 556
» Example centric programming
Sort
View
VMCAI
2005
Springer
15 years 7 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
AOSD
2004
ACM
15 years 7 months ago
Remote pointcut: a language construct for distributed AOP
This paper presents our extension to AspectJ for distributed computing. Although AspectJ allows Java developers to modularize a crosscutting concern as an aspect, this paper shows...
Muga Nishizawa, Shigeru Chiba, Michiaki Tatsubori
MMSEC
2004
ACM
109views Multimedia» more  MMSEC 2004»
15 years 7 months ago
Statistical characterisation of MP3 encoders for steganalysis
This paper outlines a strategy to discriminate different ISO/ MPEG 1 Audio Layer-3 (MP3) encoding programs by statistical particularities of the compressed audio streams. We use ...
Rainer Böhme, Andreas Westfeld
131
Voted
SIGCSE
2004
ACM
188views Education» more  SIGCSE 2004»
15 years 7 months ago
Buffer pools and file processing projects for an undergraduate data structures course
This paper presents a family of programming projects appropriate to a sophomore-level data structures course, centered around the concept of a buffer pool serving as the access i...
Clifford A. Shaffer
SIGOPSE
2004
ACM
15 years 7 months ago
Generic role assignment for wireless sensor networks
Wireless ad hoc networks of sensor nodes are envisioned to be deployed in the physical environment to monitor a wide variety of real-world phenomena. Almost any sensor network appl...
Kay Römer, Christian Frank, Pedro José...