Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: magazinearticle
|
![]() |
Trespass, nuisance, and spam: 11th century common law meets the internetAALBERTS, Robert J ; POON, Percy S ; THISTLE, Paul DCommunications of the ACM, 2007-12, Vol.50 (12), p.40-45New York, NY: Association for Computing MachineryTexto completo disponível |
2 |
Material Type: magazinearticle
|
![]() |
The threat of long-arm jurisdiction to electronic commerceAalberts, Robert J ; Townsend, Anthony M ; Whitman, Michael ECommunications of the ACM, 1998-12, Vol.41 (12), p.15-20New York: Association for Computing MachineryTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
A framework for defending embedded systems against software attacksAaraj, Najwa ; Raghunathan, Anand ; Jha, Niraj K.ACM transactions on embedded computing systems, 2011-04, Vol.10 (3), p.1-23 [Periódico revisado por pares]Texto completo disponível |
4 |
Material Type: magazinearticle
|
![]() |
Quantum MoneyAARONSON, Scott ; FARHI, Edward ; GOSSET, David ; HASSIDIM, Avinatan ; KELNER, Jonathan ; LUTOMIRSKI, AndrewCommunications of the ACM, 2012-08, Vol.55 (8), p.84-92New York, NY: Association for Computing MachineryTexto completo disponível |
5 |
Material Type: magazinearticle
|
![]() |
Designing concurrent and distributed control systemsAarsten, Amund ; Brugali, Davide ; Menga, GiuseppeCommunications of the ACM, 1996-10, Vol.39 (10), p.50-58New York: Association for Computing MachineryTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Aurora: a new model and architecture for data stream managementABADI, Daniel J ; CARNEY, Don ; CETINTEMEL, Ugur ; CHERNIACK, Mitch ; CONVEY, Christian ; SANGDON LEE ; STONEBRAKER, Michael ; TATBUL, Nesime ; ZDONIK, StanThe VLDB journal, 2003-08, Vol.12 (2), p.120-139Heidelberg: SpringerTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Nonclausal deduction in first-order temporal logicABADI, M ; MANNA, ZJournal of the ACM, 1990-04, Vol.37 (2), p.279-317 [Periódico revisado por pares]New York, NY: Association for Computing MachineryTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Secrecy by typing in security protocolsAbadi, MartinJournal of the ACM, 1999-09, Vol.46 (5), p.749-786 [Periódico revisado por pares]New York: Association for Computing MachineryTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Analyzing security protocols with secrecy types and logic programsABADI, Martin ; BLANCHET, BrunoJournal of the ACM, 2005, Vol.52 (1), p.102-146 [Periódico revisado por pares]New York, NY: Association for Computing MachineryTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
Security Analysis of Cryptographically Controlled Access to XML DocumentsABADI, Martin ; WARINSCHI, BogdanJournal of the ACM, 2008-05, Vol.55 (2), p.1-29 [Periódico revisado por pares]New York, NY: Association for Computing MachineryTexto completo disponível |