Sciweavers

1777 search results - page 188 / 356
» Programming Cryptographic Protocols
Sort
View
ERLANG
2006
ACM
15 years 11 months ago
Concurrency oriented programming in termite scheme
Termite Scheme is a variant of Scheme intended for distributed computing. It offers a simple and powerful concurrency model, inspired by the Erlang programming language, which is ...
Guillaume Germain
137
Voted
WCRE
2000
IEEE
15 years 9 months ago
Next Generation Data Interchange: Tool-to-Tool Application Program Interfaces
Data interchange in the form of a standard exchange format(SEF) is only a first step towards tool interoperability. Inter-tool communication using files is slow and cumbersome; a ...
Susan Elliott Sim
138
Voted
CCR
1999
110views more  CCR 1999»
15 years 4 months ago
Independent active program representation using ASN. 1
act Syntax Notation One (ASN.1) can be used as a common substrate for representing active programs. An active networking framework, using ASN.1 whereby any active network solution ...
Brad Williamson, Craig Farrell
NDSS
2008
IEEE
15 years 11 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
CANPC
1999
Springer
15 years 9 months ago
Implementing Application-Specific Cache-Coherence Protocols in Configurable Hardware
Streamlining communication is key to achieving good performance in shared-memory parallel programs. While full hardware support for cache coherence generally offers the best perfo...
David Brooks, Margaret Martonosi