No abstract available.
Cited By
- Medvidovic N On the role of middleware in architecture-based software development Proceedings of the 14th international conference on Software engineering and knowledge engineering, (299-306)
- Heimbigner D Adapting publish/subscribe middleware to achieve Gnutella-like functionality Proceedings of the 2001 ACM symposium on Applied computing, (176-181)
- Carzaniga A, Rosenblum D and Wolf A (2001). Design and evaluation of a wide-area event notification service, ACM Transactions on Computer Systems (TOCS), 19:3, (332-383), Online publication date: 1-Aug-2001.
- Wismüller R and Ludwig T (2019). Interoperable Run-Time Tools for Distributed Systems—A Case Study, The Journal of Supercomputing, 17:3, (277-289), Online publication date: 1-Nov-2000.
- Carzaniga A, Rosenblum D and Wolf A Achieving scalability and expressiveness in an Internet-scale event notification service Proceedings of the nineteenth annual ACM symposium on Principles of distributed computing, (219-227)
- Dashofy E, Medvidovic N and Taylor R Using off-the-shelf middleware to implement connectors in distributed software architectures Proceedings of the 21st international conference on Software engineering, (3-12)
- Rosenblum D and Wolf A A design framework for Internet-scale event observation and notification Proceedings of the 6th European SOFTWARE ENGINEERING conference held jointly with the 5th ACM SIGSOFT international symposium on Foundations of software engineering, (344-360)
- Rosenblum D and Wolf A (2019). A design framework for Internet-scale event observation and notification, ACM SIGSOFT Software Engineering Notes, 22:6, (344-360), Online publication date: 1-Nov-1997.
- Taylor R, Medvidovic N, Anderson K, Whitehead E, Robbins J, Nies K, Oreizy P and Dubrow D (1996). A Component- and Message-Based Architectural Style for GUI Software, IEEE Transactions on Software Engineering, 22:6, (390-406), Online publication date: 1-Jun-1996.
Index Terms
- ToolTalk and open protocols: inter-application communication
Recommendations
Two-phase Nonrepudiation Protocols
ICCCNT '16: Proceedings of the 7th International Conference on Computing Communication and Networking TechnologiesA nonrepudiation protocol from party S to party R performs two tasks. First, the protocol enables party S to send to party R some text x along with a proof (that can convince a judge) that x was indeed sent by S. Second, the protocol enables party R to ...
Protocols for Multiparty Coin Toss with a Dishonest Majority
Coin-tossing protocols are protocols that generate a random bit with uniform distribution, although some corrupted parties might try to bias the output. These protocols are used as a building block in many cryptographic protocols. Cleve (Proc. of the ...
Stateless Cryptographic Protocols
FOCS '11: Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer ScienceSecure computation protocols inherently involve multiple rounds of interaction among the parties where, typically a party has to keep a state about what has happened in the protocol so far and then \emph{wait} for the other party to respond. We study if ...