Sciweavers

28 search results - page 4 / 6
» Knowledge Compilation Properties of Tree-of-BDDs
Sort
View
BMCBI
2002
99views more  BMCBI 2002»
13 years 6 months ago
FunSpec: a web-based cluster interpreter for yeast
Background: For effective exposition of biological information, especially with regard to analysis of large-scale data types, researchers need immediate access to multiple categor...
Mark D. Robinson, Jörg Grigull, Naveed Mohamm...
OOPSLA
2010
Springer
13 years 4 months ago
Parallel inclusion-based points-to analysis
Inclusion-based points-to analysis provides a good trade-off between precision of results and speed of analysis, and it has been incorporated into several production compilers inc...
Mario Méndez-Lojo, Augustine Mathew, Keshav...
IACR
2011
97views more  IACR 2011»
12 years 5 months ago
Two-Output Secure Computation with Malicious Adversaries
We present a method to compile Yao’s two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our ap...
Abhi Shelat, Chih-Hao Shen
ICS
2010
Tsinghua U.
14 years 3 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
CCS
2009
ACM
14 years 27 days ago
Behavior based software theft detection
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which re...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu