Sciweavers

2635 search results - page 242 / 527
» Computing multihomogeneous resultants using straight-line pr...
Sort
View
ACMSE
2004
ACM
15 years 6 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
CLUSTER
2003
IEEE
15 years 6 months ago
Distributed Recursive Sets: Programmability and Effectiveness for Data Intensive Applications
This paper presents a concurrent object model based on distributed recursive sets for data intensive applications that use complex, recursive data layouts. The set abstraction is ...
Roxana Diaconescu, Reidar Conradi
110
Voted
EMMCVPR
2001
Springer
15 years 5 months ago
Averaged Template Matching Equations
By exploiting an analogy with averaging procedures in fluid dynamics, we present a set of averaged template matching equations. These equations are analogs of the exact template m...
Anil N. Hirani, Jerrold E. Marsden, James Arvo
191
Voted
POPL
2008
ACM
16 years 29 days ago
Lightweight semiformal time complexity analysis for purely functional data structures
Okasaki and others have demonstrated how purely functional data structures that are efficient even in the presence of persistence can be constructed. To achieve good time bounds e...
Nils Anders Danielsson
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
14 years 10 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens