Sciweavers

1777 search results - page 214 / 356
» Programming Cryptographic Protocols
Sort
View
FORTE
2008
15 years 2 months ago
An SMT Approach to Bounded Reachability Analysis of Model Programs
Model programs represent transition systems that are used fy expected behavior of systems at a high level of abstraction. The main application area is application-level network pro...
Margus Veanes, Nikolaj Bjørner, Alexander R...
TOCS
2002
70views more  TOCS 2002»
15 years 1 months ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
PERCOM
2007
ACM
16 years 1 months ago
A State-Based Programming Model and System for Wireless Sensor Networks
Sensor networks are one important building block towards the realisation of context-aware applications. Suitable communication protocols and middleware solutions are necessary to ...
Urs Bischoff, Gerd Kortuem
WEBDB
1998
Springer
83views Database» more  WEBDB 1998»
15 years 5 months ago
On the Unification of Persistent Programming and the World Wide Web
In its infancy, the World-Wide Web consisted of a web of largely static hypertext documents. As time progresses it is evolving into a domain which supports almost arbitrary network...
Richard C. H. Connor, Keith Sibson, Paolo Manghi
ECOOP
2008
Springer
15 years 3 months ago
Session-Based Distributed Programming in Java
This paper demonstrates the impact of integrating session types and object-oriented programming, through their implementation in Java. Seses provide high-level abstraction for stru...
Raymond Hu, Nobuko Yoshida, Kohei Honda