Sciweavers

14824 search results - page 127 / 2965
» Security - Introduction
Sort
View
AGENTS
1997
Springer
15 years 6 months ago
Hide-and-Seek: Effective Use of Memory in Perception/Action Systems
Glenn S. Wasson, Gabriel J. Ferrer, Worthy N. Mart...
CSFW
1996
IEEE
15 years 6 months ago
A Logic of Composition for Information Flow Predicates
Ramesh V. Peri, William A. Wulf, Darrell M. Kienzl...
CSFW
1996
IEEE
15 years 6 months ago
Towards a model of storage jamming
John P. McDermott, David M. Goldschlag
CCS
1997
ACM
15 years 6 months ago
Proactive Public Key and Signature Systems
Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki...
OOPSLA
1997
Springer
15 years 6 months ago
Adding Type Parameterization to the Java Language
Ole Agesen, Stephen N. Freund, John C. Mitchell