Sciweavers

1777 search results - page 185 / 356
» Programming Cryptographic Protocols
Sort
View
AOSD
2007
ACM
15 years 5 months ago
Expressive programs through presentation extension
Most approaches to programming language extensibility have worked by pairing syntactic extension with semantic extension. We present an approach that works through a combination o...
Andrew David Eisenberg, Gregor Kiczales
JSW
2007
115views more  JSW 2007»
15 years 1 months ago
Modeling Network Behaviour By Full-System Simulation
— Due to the network technology advances, an order-of-magnitude jump has been produced in the network bandwidth. This fact has returned to wake up the interest on protocol offloa...
Andrés Ortiz, Julio Ortega, Antonio F. D&ia...
TPDS
2010
125views more  TPDS 2010»
14 years 8 months ago
Dealing with Transient Faults in the Interconnection Network of CMPs at the Cache Coherence Level
The importance of transient faults is predicted to grow due to current technology trends of increased scale of integration. One of the components that will be significantly affecte...
Ricardo Fernández Pascual, José M. G...
BIRTHDAY
2008
Springer
15 years 3 months ago
Session and Union Types for Object Oriented Programming
In network applications it is crucial to have a mechanism to guarantee that communications evolve correctly according to the agreed protocol. Session types offer a method for abstr...
Lorenzo Bettini, Sara Capecchi, Mariangiola Dezani...
PDPTA
1997
15 years 2 months ago
DIPC: A System Software Solution for Distributed Programming
Distributed Inter-Process Communication (DIPC) provides the programmers of the Linux operating system with distributed programming facilities, including Distributed Shared Memory ...
Kamran Karimi, Mohsen Sharifi