Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
Deposit type : Fulltext
labStructName_s : IBM Austin Research Lab [Austin]
labStructName_s : Laboratoire d'informatique de l'école normale supérieure
Image document

Can code polymorphism limit information leakage?

Antoine Amarilli , Sascha Müller , David Naccache , Daniel Page , Pablo Rauzy , et al.
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers hal-01110259v1
Image document

Co-managing Software and Hardware Modules through the Juggle Middleware

Jan S. Rellermeyer , Ramon Küpfer
12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.431-450, ⟨10.1007/978-3-642-25821-3_22⟩
Conference papers hal-01597778v1
Image document

Virtualizing Stream Processing

Michael Duller , Jan S. Rellermeyer , Gustavo Alonso , Nesime Tatbul
12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.269-288, ⟨10.1007/978-3-642-25821-3_14⟩
Conference papers hal-01597774v1