Sciweavers

1777 search results - page 224 / 356
» Programming Cryptographic Protocols
Sort
View
TOOLS
2008
IEEE
15 years 11 months ago
Modeling of Component Environment in Presence of Callbacks and Autonomous Activities
Abstract. A popular approach to compositional verification of component-based applications is based on the assume-guarantee paradigm, where an assumption models behavior of an env...
Pavel Parizek, Frantisek Plasil
SOCO
2005
Springer
15 years 10 months ago
Stateful Aspects in JAsCo
Aspects that trigger on a sequence of join points instead of on a single join point are not explicitly supported in current AspectOriented approaches. Explicit protocols are howeve...
Wim Vanderperren, Davy Suvée, María ...
ASPLOS
2000
ACM
15 years 9 months ago
Evaluating Design Alternatives for Reliable Communication on High-Speed Networks
We systematically evaluate the performance of five implementations of a single, user-level communication interface. Each implementation makes different architectural assumptions ...
Raoul Bhoedjang, Kees Verstoep, Tim Rühl, Hen...
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
15 years 11 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee
PERCOM
2007
ACM
16 years 4 months ago
MundoCore: A light-weight infrastructure for pervasive computing
MundoCore is a communication middleware specifically designed for the requirements of pervasive computing. To address the high degree of heterogeneity of platforms and networking ...
Erwin Aitenbichler, Jussi Kangasharju, Max Mühlh...