Sciweavers

70 search results - page 12 / 14
» Type Safe Algorithmic Skeletons
Sort
View
TCS
2008
13 years 5 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
INFOCOM
2011
IEEE
12 years 9 months ago
Hidden communication in P2P networks Steganographic handshake and broadcast
—We consider the question of how a conspiring subgroup of peers in a p2p network can find each other and communicate without provoking suspicion among regular peers or an author...
Raphael Eidenbenz, Thomas Locher, Roger Wattenhofe...
ML
2007
ACM
101views Machine Learning» more  ML 2007»
13 years 5 months ago
A persistent union-find data structure
The problem of disjoint sets, also known as union-find, consists in maintaining a partition of a finite set within a data structure. This structure provides two operations: a fu...
Sylvain Conchon, Jean-Christophe Filliâtre
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 6 months ago
Open Graphs and Monoidal Theories
String diagrams are a powerful tool for reasoning about physical processes, logic circuits, tensor networks, and many other compositional structures. The distinguishing feature of...
Lucas Dixon, Aleks Kissinger
ISER
2004
Springer
123views Robotics» more  ISER 2004»
13 years 11 months ago
Free-Climbing with a Multi-Use Robot
This paper presents a new four-limbed robot, LEMUR IIb (Legged Excursion Mechanical Utility Rover), that can free-climb vertical rock surfaces. This robot was designed to have a nu...
Timothy Bretl, Stephen M. Rock, Jean-Claude Latomb...