Sciweavers

1791 search results - page 112 / 359
» Behavioral Operations
Sort
View
130
Voted
ACNS
2006
Springer
138views Cryptology» more  ACNS 2006»
15 years 8 months ago
Syntax-Driven Private Evaluation of Quantified Membership Queries
Abstract. Membership queries are basic predicate operations that apply to datasets. Quantifications of such queries express global properties between datasets, including subset inc...
Aggelos Kiayias, Antonina Mitrofanova
DAGSTUHL
2006
15 years 6 months ago
An Operator-based Approach to Incremental Development of Conform Protocol State Machines
An incremental development framework which supports a conform construction of Protocol State Machines (PSMs) is presented. We capture design concepts and strategies of PSM constru...
Arnaud Lanoix, Dieu Donné Okalas Ossami, Je...
IISWC
2006
IEEE
15 years 10 months ago
Comparing Benchmarks Using Key Microarchitecture-Independent Characteristics
— Understanding the behavior of emerging workloads is important for designing next generation microprocessors. For addressing this issue, computer architects and performance anal...
Kenneth Hoste, Lieven Eeckhout
COORDINATION
2004
Springer
15 years 10 months ago
Active Coordination in Ad Hoc Networks
The increasing ubiquity of mobile devices has led to an explosion in the development of applications tailored to the particular needs of individual users. As the research communit...
Christine Julien, Gruia-Catalin Roman
TACAS
2012
Springer
275views Algorithms» more  TACAS 2012»
14 years 9 days ago
Pushdown Model Checking for Malware Detection
The number of malware is growing extraordinarily fast. Therefore, it is important to have efficient malware detectors. Malware writers try to obfuscate their code by different tec...
Fu Song, Tayssir Touili