Sciweavers

798 search results - page 86 / 160
» Statecharts as Protocols for Objects
Sort
View
TMC
2012
13 years 2 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
CLUSTER
2003
IEEE
15 years 5 months ago
Compiler Optimized Remote Method Invocation
We further increase the efficiency of Java RMI programs. Where other optimizing re-implementations of RMI use pre-processors to create stubs and skeletons and to create class spe...
Ronald Veldema, Michael Philippsen
AINA
2005
IEEE
15 years 5 months ago
A Technical Comparison of IPSec and SSL
IPSec (IP Security) and SSL (Secure Socket Layer) have been the most robust and most potential tools available for securing communications over the Internet. Both IPSec and SSL ha...
AbdelNasir Alshamsi, Takamichi Saito
ICDCS
2005
IEEE
15 years 5 months ago
Mixed Consistency Model: Meeting Data Sharing Needs of Heterogeneous Users
Heterogeneous users usually have different requirements as far as consistency of shared data is concerned. This paper proposes and investigates a mixed consistency model to meet t...
Zhiyuan Zhan, Mustaque Ahamad, Michel Raynal
GPCE
2003
Springer
15 years 5 months ago
Making Patterns Explicit with Metaprogramming
Abstract. Design patterns have been a useful tool for a better understanding of the collaboration between several classes and objects in a program. One drawback of this approach is...
Daniel von Dincklage