Sciweavers

4820 search results - page 434 / 964
» Implementing Signatures for C
Sort
View
ISSTA
2006
ACM
15 years 11 months ago
Performance assertions for mobile devices
Assertions have long been used to validate the functionality of software systems. Researchers and practitioners have extended them for validation of non-functional requirements, s...
Raimondas Lencevicius, Edu Metz
167
Voted
MUM
2006
ACM
181views Multimedia» more  MUM 2006»
15 years 11 months ago
Cross-layer design for providing service oriented architecture in a mobile Ad Hoc network
This paper presents a novel cross-layer design for providing service oriented architecture (SOA) in a mobile ad hoc network (MANET). In the design SOA service discovery is integra...
Tommi Halonen, Timo Ojala
137
Voted
SAC
2006
ACM
15 years 11 months ago
A concurrent reactive Esterel processor based on multi-threading
Esterel is a concurrent synchronous language for developing reactive systems. As an alternative to the classical software and hardware synthesis paths, the reactive processing app...
Xin Li, Reinhard von Hanxleden
SIGCOMM
2006
ACM
15 years 11 months ago
Revisiting IP multicast
This paper revisits a much explored topic in networking – the search for a simple yet fully-general multicast design. The many years of research into multicast routing have led ...
Sylvia Ratnasamy, Andrey Ermolinskiy, Scott Shenke...
WS
2006
ACM
15 years 11 months ago
Integrity regions: authentication through presence in wireless networks
We introduce Integrity (I) regions, a novel security primitive that enables message authentication in wireless networks without the use of pre-established or pre-certified keys. ...
Srdjan Capkun, Mario Cagalj