Sciweavers

3504 search results - page 512 / 701
» Secure protocol composition
Sort
View
DSD
2008
IEEE
136views Hardware» more  DSD 2008»
15 years 8 months ago
Flexible Baseband Architectures for Future Wireless Systems
— The mobile communication systems today, have different radio spectrum, radio access technologies, and protocol stacks depending on the network being utilized. This gives rise t...
Najam-ul-Islam Muhammad, Rizwan Rasheed, Renaud Pa...
TLCA
2007
Springer
15 years 7 months ago
Two Session Typing Systems for Higher-Order Mobile Processes
Abstract. This paper proposes two typing systems for session interactions in higherorder mobile processes. Session types for the HOπ-calculus capture high-level structures nicatio...
Dimitris Mostrous, Nobuko Yoshida
IFIP
2004
Springer
15 years 7 months ago
Ensuring Termination by Typability
A term terminates if all its reduction sequences are of finite length. We show four type systems that ensure termination of well-typed π-calculus processes. The systems are obtai...
Yuxin Deng, Davide Sangiorgi
SIGCOMM
1996
ACM
15 years 5 months ago
ASHs: Application-Specific Handlers for High-Performance Messaging
Application-specific safe message handlers (ASHs) are designed to provide applications with hardware-level network performance. ASHs are user-written code fragments that safely an...
Deborah A. Wallach, Dawson R. Engler, M. Frans Kaa...
144
Voted
FGR
2006
IEEE
154views Biometrics» more  FGR 2006»
15 years 5 months ago
Toward an Efficient and Accurate AAM Fitting on Appearance Varying Faces
Automatic extraction of facial feature deformations (either due to identity change or expression) is a challenging task and could be the base of a facial expression interpretation...
Hugo Mercier, Julien Peyras, Patrice Dalle