Sciweavers

12289 search results - page 2157 / 2458
» computing 2006
Sort
View
ESAW
2006
Springer
15 years 8 months ago
A Norm-Governed Systems Perspective of Ad Hoc Networks
Ad hoc networks are a type of computational system whose members may fail to, or choose not to, comply with the laws governing their behaviour. We are investigating to what extent ...
Alexander Artikis, Lloyd Kamara, Jeremy Pitt
ESOP
2006
Springer
15 years 8 months ago
A Typed Assembly Language for Confidentiality
Language-based information-flow analysis is promising in protecting data confidentiality. Although much work has been carried out in this area, relatively little has been done for ...
Dachuan Yu, Nayeem Islam
ESOP
2006
Springer
15 years 8 months ago
Pure Pattern Calculus
Abstract. The pure pattern calculus generalises the pure lambda-calculus by basing computation on pattern-matching instead of beta-reduction. The simplicity and power of the calcul...
C. Barry Jay, Delia Kesner
ESORICS
2006
Springer
15 years 8 months ago
Secure Key-Updating for Lazy Revocation
Abstract. We consider the problem of efficient key management and user revocation in cryptographic file systems that allow shared access to files. A performanceefficient solution t...
Michael Backes, Christian Cachin, Alina Oprea
ESTIMEDIA
2006
Springer
15 years 8 months ago
A Communication Interface for Multiprocessor Signal Processing Systems
Parallelization of embedded software is often desirable for power/performance-related considerations for computation-intensive applications that frequently occur in the signal-pro...
Sankalita Saha, Shuvra S. Bhattacharyya, Wayne Wol...
« Prev « First page 2157 / 2458 Last » Next »