Sciweavers

58 search results - page 12 / 12
» Mechanical Theorem Proving in Computational Geometry
Sort
View
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
13 years 4 months ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...
CORR
2007
Springer
126views Education» more  CORR 2007»
13 years 4 months ago
Linear Tabling Strategies and Optimizations
Recently there has been a growing interest of research in tabling in the logic programming community because of its usefulness in a variety of application domains including progra...
Neng-Fa Zhou, Taisuke Sato, Yi-Dong Shen
ACSAC
2007
IEEE
13 years 11 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda