Sciweavers

3362 search results - page 71 / 673
» A definition of subjective possibility
Sort
View
FSE
2008
Springer
110views Cryptology» more  FSE 2008»
15 years 1 months ago
How to Encrypt with a Malicious Random Number Generator
Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving an adversary access to an oracle that encrypts a given message m using random coins that ...
Seny Kamara, Jonathan Katz
FMOODS
2008
15 years 1 months ago
Semantic Foundations and Inference of Non-null Annotations
This paper proposes a semantics-based automatic null pointer analysis for inferring non-null annotations of fields in objectoriented programs. The analysis is formulated for a mini...
Laurent Hubert, Thomas P. Jensen, David Pichardie
RIVF
2007
15 years 1 months ago
Forgetting data intelligently in data warehouses
— The amount of data stored in data warehouses grows very quickly so that they can get saturated. To overcome this problem, we propose a language for specifying forgetting functi...
Aliou Boly, Georges Hébrail
DELFI
2004
15 years 1 months ago
Semantic Interrelation of Documents via an Ontology
Abstract. This tutorial describes the rationale for and use of an ontology for extensive semantic interrelation of documents to increase "sustainable development", i.e. c...
Bernd Krieg-Brückner, Arne Lindow, Christoph ...
DIMVA
2004
15 years 1 months ago
Foundations for Intrusion Prevention
: We propose an infrastructure that helps a system administrator to identify a newly published vulnerability on the site hosts and to evaluate the vulnerability's threat with ...
Shai Rubin, Ian D. Alderman, David W. Parter, Mary...