Sciweavers

137
Voted
FC
2009
Springer
84views Cryptology» more  FC 2009»
15 years 8 months ago
Private Intersection of Certified Sets
Abstract. This paper introduces certified sets to the private set intersection problem. A private set intersection protocol allows Alice and Bob to jointly compute the set intersec...
Jan Camenisch, Gregory M. Zaverucha
FAW
2009
Springer
118views Algorithms» more  FAW 2009»
15 years 8 months ago
Space-Query-Time Tradeoff for Computing the Visibility Polygon
Abstract. Computing the visibility polygon, VP, of a point in a polygonal scene, is a classical problem that has been studied extensively. In this paper, we consider the problem of...
Mostafa Nouri, Mohammad Ghodsi
FASE
2009
Springer
15 years 8 months ago
Enhanced Property Specification and Verification in BLAST
Model checking tools based on the iterative refinement of predicate abstraction (e.g., Slam and Blast) often feature a specification language for expressing complex behavior rules....
Ondrej Sery
138
Voted
FASE
2009
Springer
15 years 8 months ago
Mining API Error-Handling Specifications from Source Code
Abstract. API error-handling specifications are often not documented, necessitating automated specification mining. Automated mining of error-handling specifications is challenging...
Mithun Acharya, Tao Xie
FASE
2009
Springer
15 years 8 months ago
Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection
Abstract. Structure-oriented approaches in clone detection have become popular in both code-based and model-based clone detection. However, existing methods for capturing structura...
Hoan Anh Nguyen, Tung Thanh Nguyen, Nam H. Pham, J...