Sciweavers

631 search results - page 92 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
CSL
2000
Springer
15 years 6 months ago
Subtyping with Power Types
This paper introduces a typed λ-calculus called λPower , a predicative reformulation of part of Cardelli’s power type system. Power types integrate subtyping into the typing t...
David Aspinall
CCS
2010
ACM
15 years 5 months ago
Controlling data disclosure in computational PIR protocols
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server which is not fully trusted, without disclosing to the server the particular data e...
Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa B...
PLDI
1999
ACM
15 years 5 months ago
Enhanced Code Compression for Embedded RISC Processors
This paper explores compiler techniques for reducing the memory needed to load and run program executables. In embedded systems, where economic incentives to reduce both ram and r...
Keith D. Cooper, Nathaniel McIntosh
ICDCS
1997
IEEE
15 years 5 months ago
Effect of Connection Rerouting on Application Performance in Mobile Networks
—The increasing deployment of wireless access technology, along with the emergence of high speed integrated service networks, such as ATM, promises to provide mobile users with u...
Partho Pratim Mishra, Mani B. Srivastava
SPATIALCOGNITION
1998
Springer
15 years 5 months ago
Spatial Orientation in Virtual Environments: Background Considerations and Experiments
Spatial orientation strongly relies on visual and whole-body information available while moving through space. As virtual environments allow to isolate the contribution of visual i...
Fredrik Wartenberg, Mark May, Patrick Péruc...