Sciweavers

3971 search results - page 652 / 795
» On the Use of Properties in Java Applications
Sort
View
CADE
2008
Springer
16 years 5 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
ICALP
2009
Springer
16 years 5 months ago
A Distributed and Oblivious Heap
This paper shows how to build and maintain a distributed heap which we call SHELL. In contrast to standard heaps, our heap is oblivious in the sense that its structure only depends...
Christian Scheideler, Stefan Schmid
ICFP
2006
ACM
16 years 4 months ago
OCaml + XDuce
This paper presents the core type system and type inference algorithm of OCamlDuce, a merger between OCaml and XDuce. The challenge was to combine two type checkers of very differ...
Alain Frisch
PERCOM
2007
ACM
16 years 4 months ago
Energy-Aware Tag Anti-Collision Protocols for RFID Systems
Energy consumption of mobile readers is becoming an important issue as applications of RFID systems pervade different aspects of our lives. Surprisingly, however, these systems ar...
Vinod Namboodiri, Lixin Gao
MICCAI
2009
Springer
16 years 2 months ago
Mesh Generation from 3D Multi-material Images
Generating realistic geometric models from 3D segmented images is an important task in many biomedical applications. Segmented 3D images impose particular challenges for meshing a...
Dobrina Boltcheva, Mariette Yvinec, Jean-Daniel Bo...