Sciweavers

465 search results - page 57 / 93
» Programmable Hash Functions and Their Applications
Sort
View
IPPS
2007
IEEE
15 years 4 months ago
VoroNet: A scalable object network based on Voronoi tessellations
In this paper, we propose the design of VoroNet, an objectbased peer to peer overlay network relying on Voronoi tessellations, along with its theoretical analysis and experimental...
Olivier Beaumont, Anne-Marie Kermarrec, Loris Marc...
IH
2007
Springer
15 years 4 months ago
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...
INFOCOM
2006
IEEE
15 years 4 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
MOZ
2004
Springer
15 years 3 months ago
P2PS: Peer-to-Peer Development Platform for Mozart
Abstract. Recently, development of peer-to-peer (P2P) applications has been giving a paramount attention mostly due to their attractive features such as decentralization and self-o...
Valentin Mesaros, Bruno Carton, Peter Van Roy
PPDP
2007
Springer
15 years 4 months ago
Putting declarative programming into the web: translating curry to javascript
We propose a framework to construct web-oriented user interfaces in a high-level way by exploiting declarative programming techniques. Such user interfaces are intended to manipul...
Michael Hanus