Sciweavers

262 search results - page 17 / 53
» Robust mechanisms for information elicitation
Sort
View
ECOOP
2006
Springer
15 years 1 months ago
Design-Based Pointcuts Robustness Against Software Evolution
Aspect-Oriented Programming (AOP) is a powerful technique to better modularize object-oriented programs by introducing crosscutting concerns in a safe and noninvasive way. Unfortu...
Walter Cazzola, Sonia Pini, Massimo Ancona
SP
1998
IEEE
162views Security Privacy» more  SP 1998»
15 years 1 months ago
Complete, Safe Information Flow with Decentralized Labels
The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Andrew C. Myers, Barbara Liskov
ICC
2008
IEEE
125views Communications» more  ICC 2008»
15 years 4 months ago
Real-Time, Byzantine-Tolerant Information Dissemination in Unreliable and Untrustworthy Distributed Systems
—In unreliable and untrustworthy systems, information dissemination may suffer network failures and attacks from Byzantine nodes which are controlled by traitors or adversaries, ...
Kai Han, Guanhong Pei, Binoy Ravindran, E. Douglas...
EH
2004
IEEE
149views Hardware» more  EH 2004»
15 years 1 months ago
Organization of the Information Flow in the Perception-Action Loop of Evolved Agents
Sensor evolution in nature aims at improving the acquisition of information from the environment and is intimately related with selection pressure towards adaptivity and robustnes...
Alexander S. Klyubin, Daniel Polani, Chrystopher L...
CCS
2008
ACM
14 years 11 months ago
Information leaks in structured peer-to-peer anonymous communication systems
We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show t...
Prateek Mittal, Nikita Borisov