Sciweavers

3483 search results - page 633 / 697
» Forward
Sort
View
CTRSA
2003
Springer
116views Cryptology» more  CTRSA 2003»
15 years 2 months ago
Intrusion-Resilient Public-Key Encryption
Exposure of secret keys seems to be inevitable, and may in practice represent the most likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilien...
Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz...
80
Voted
ECAL
2003
Springer
15 years 2 months ago
A Universal Framework for Self-Replication
Abstract. Self-replication is a fundamental property of many interesting physical, formal and biological systems, such as crystals, waves, automata, and especially forms of natural...
Bryant Adams, Hod Lipson
GCC
2003
Springer
15 years 2 months ago
Component-Based Middleware Platform for Grid Computing
: In the Grid environment, user can manage and make use of web services, such as uploading or downloading web services. But when user want to download one web services to run it in...
Jianmin Zhu, Rong Chen, Guangnan Ni, Yuan Liu
IFIP
2003
Springer
15 years 2 months ago
A Novel Energy Efficient Communication Architecture for Bluetooth Ad Hoc Networks
Bluetooth is a promising wireless technology aiming at supporting electronic devices to be instantly interconnected into short-range ad hoc networks. The Bluetooth medium access co...
Carlos de M. Cordeiro, Sachin Abhyankar, Dharma P....
PLDI
2010
ACM
15 years 2 months ago
Finding low-utility data structures
Many opportunities for easy, big-win, program optimizations are missed by compilers. This is especially true in highly layered Java applications. Often at the heart of these misse...
Guoqing Xu, Nick Mitchell, Matthew Arnold, Atanas ...