منابع مشابه
MoP-2-MoP - Mobile Private Microblogging
Microblogging services have become popular, especially since smartphones made them easily accessible for common users. However, current services like Twitter rely on a centralized infrastructure, which has serious drawbacks from privacy and reliability perspectives. In this paper, we present a decentralized privacy-preserving microblogging infrastructure based on a distributed peer-to-peer netw...
متن کاملMop 2007
It is often a good idea to look at the coefficients of the polynomial from a number theoretical standpoint. The general principle is that any polynomial equation can be reduced mod m to obtain another polynomial equation whose coefficients are the residue classes mod m. Many criterions exist for testing whether a polynomial is irreducible. Unfortunately, none are powerful enough to be universal...
متن کاملMOP 2007 Black
It is often a good idea to look at the coefficients of the polynomial from a number theoretical standpoint. The general principle is that any polynomial equation can be reduced mod m to obtain another polynomial equation whose coefficients are the residue classes mod m. Many criterions exist for testing whether a polynomial is irreducible. Unfortunately, none are powerful enough to be universal...
متن کاملA Simple Security-Aware MOP for Java
This article investigates the security problems raised by the use of proxy based runtime meta object protocols MOPs for Java and provides an approach for making meta level code transparent to base level code security wise We prove that but giving all permissions only to the kernel of the MOP and by using Java s built in mechanism for propagating security contexts the permissions required by bas...
متن کاملMOP: Reliable Software Development using Abstract Aspects
Monitoring-Oriented Programming (MOP) is a formal framework for software development and analysis. It aims at reducing the gap between formal specification and implementation via runtime monitoring. In MOP, the developer specifies desired properties using definable specification formalisms, along with code to execute when properties are violated or validated, which can be used not only to repor...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature Nanotechnology
سال: 2008
ISSN: 1748-3387,1748-3395
DOI: 10.1038/nnano.2008.230