Sciweavers

1809 search results - page 361 / 362
» A Formal Specification of dMARS
Sort
View
ASIACRYPT
2010
Springer
13 years 3 months ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
COMPSAC
2010
IEEE
13 years 3 months ago
A Consistency Model for Identity Information in Distributed Systems
In distributed IT systems, replication of information is commonly used to strengthen the fault tolerance on a technical level or the autonomy of an organization on a business level...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...
EMSOFT
2010
Springer
13 years 3 months ago
Initiating a design pattern catalog for embedded network systems
In the domain of desktop software, design patterns have had a profound impact; they are applied ubiquitously across a broad range of applications. Patterns serve both to promulgat...
Sally K. Wahba, Jason O. Hallstrom, Neelam Soundar...
ICSE
2010
IEEE-ACM
13 years 3 months ago
Synthesized essence: what game jams teach about prototyping of new software products
The development of video games comprises engineering teams within various disciplines, e.g., software engineering, game production, and creative arts. Game jams are a promising ap...
Juergen Musil, Angelika Schweda, Dietmar Winkler, ...
ICTAC
2010
Springer
13 years 3 months ago
Mechanized Verification with Sharing
We consider software verification of imperative programs by theorem proving in higher-order separation logic. Of particular interest are the difficulties of encoding and reasoning ...
J. Gregory Malecha, Greg Morrisett