Sciweavers

1805 search results - page 251 / 361
» Understanding Code Mobility
Sort
View
125
Voted
ICALP
2003
Springer
15 years 7 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
107
Voted
ICPPW
2002
IEEE
15 years 7 months ago
System Services for Implementing Ad-Hoc Routing Protocols
This paper explores several systems issues regarding the implementation of routing protocols for mobile ad-hoc networks. It proclaims that support for on-demand routing is insufï¬...
Vikas Kawadia, Yongguang Zhang, Binita Gupta
ICPPW
2000
IEEE
15 years 6 months ago
Flits: Pervasive Computing for Processor and Memory Constrained Systems
Many pervasive computing software technologies are targeted for 32-bit desktop platforms. However, there are innumerable 8, 16, and 32-bit microcontroller and microprocessor-based...
William Majurski, Alden Dima, Mary Laamanen
123
Voted
SIGOPSE
2000
ACM
15 years 6 months ago
Multiprocessing and portability for PDAs
The role of small devices in the emerging all-connected computer infrastructure is growing. So are the requirements that the application execution environments face. Portability, ...
Grzegorz Czajkowski
SP
1998
IEEE
162views Security Privacy» more  SP 1998»
15 years 6 months ago
Complete, Safe Information Flow with Decentralized Labels
The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Andrew C. Myers, Barbara Liskov