Sciweavers

2777 search results - page 421 / 556
» Example centric programming
Sort
View
138
Voted
VMCAI
2005
Springer
15 years 10 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
135
Voted
AOSD
2004
ACM
15 years 10 months ago
Remote pointcut: a language construct for distributed AOP
This paper presents our extension to AspectJ for distributed computing. Although AspectJ allows Java developers to modularize a crosscutting concern as an aspect, this paper shows...
Muga Nishizawa, Shigeru Chiba, Michiaki Tatsubori
MMSEC
2004
ACM
109views Multimedia» more  MMSEC 2004»
15 years 10 months ago
Statistical characterisation of MP3 encoders for steganalysis
This paper outlines a strategy to discriminate different ISO/ MPEG 1 Audio Layer-3 (MP3) encoding programs by statistical particularities of the compressed audio streams. We use ...
Rainer Böhme, Andreas Westfeld
SIGCSE
2004
ACM
188views Education» more  SIGCSE 2004»
15 years 10 months ago
Buffer pools and file processing projects for an undergraduate data structures course
This paper presents a family of programming projects appropriate to a sophomore-level data structures course, centered around the concept of a buffer pool serving as the access i...
Clifford A. Shaffer
141
Voted
SIGOPSE
2004
ACM
15 years 10 months ago
Generic role assignment for wireless sensor networks
Wireless ad hoc networks of sensor nodes are envisioned to be deployed in the physical environment to monitor a wide variety of real-world phenomena. Almost any sensor network appl...
Kay Römer, Christian Frank, Pedro José...