Sciweavers

823 search results - page 19 / 165
» A Graph-Theoretic Analysis of Information Value
Sort
View
CANS
2008
Springer
111views Cryptology» more  CANS 2008»
15 years 1 months ago
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Tiancheng Lou, Christophe Tartary
ISI
2005
Springer
15 years 5 months ago
Integrating Private Databases for Data Analysis
In today’s globally networked society, there is a dual demand on both information sharing and information protection. A typical scenario is that two parties wish to integrate the...
Ke Wang, Benjamin C. M. Fung, Guozhu Dong
IFL
2005
Springer
155views Formal Methods» more  IFL 2005»
15 years 5 months ago
A Binding Scope Analysis for Generic Programs on Arrays
Performance of generic array programs crucially relies on program specialization wrt. shape information. Traditionally, this is done in a rather adhoc fashion by propagating all sh...
Clemens Grelck, Sven-Bodo Scholz, Alexander V. Sha...
AGP
1993
IEEE
15 years 3 months ago
Static Analysis of Prolog with Cut
Abstract. This paper presents a general approach to the Abstract Interpretation of Prolog programs with cut. In most of previous approaches the cut primitive is merely ignored. Our...
Gilberto Filé, Sabina Rossi
ISSTA
2010
ACM
15 years 1 months ago
Perturbing numerical calculations for statistical analysis of floating-point program (in)stability
Writing reliable software is difficult. It becomes even more difficult when writing scientific software involving floating-point numbers. Computers provide numbers with limite...
Enyi Tang, Earl T. Barr, Xuandong Li, Zhendong Su