Sciweavers

3713 search results - page 166 / 743
» Constructing a Calculus of Programs
Sort
View
137
Voted
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
15 years 9 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
131
Voted
ICML
2009
IEEE
16 years 4 months ago
Block-wise construction of acyclic relational features with monotone irreducibility and relevancy properties
We describe an algorithm for constructing a set of acyclic conjunctive relational features by combining smaller conjunctive blocks. Unlike traditional level-wise approaches which ...
Filip Zelezný, Ondrej Kuzelka
SCAM
2008
IEEE
15 years 9 months ago
Constructing Subtle Faults Using Higher Order Mutation Testing
Traditional mutation testing considers only first order mutants, created by the injection of a single fault. Often these first order mutants denote trivial faults that are easil...
Yue Jia, Mark Harman
112
Voted
ICALP
2007
Springer
15 years 9 months ago
Streaming and Fully Dynamic Centralized Algorithms for Constructing and Maintaining Sparse Spanners
We present a streaming algorithm for constructing sparse spanners and show that our algorithm out-performs significantly the state-of-the-art algorithm for this task [20]. Speci...
Michael Elkin
141
Voted
UM
2005
Springer
15 years 9 months ago
Exploiting Probabilistic Latent Information for the Construction of Community Web Directories
This paper improves a recently-presented approach to Web Personalization, named Community Web Directories, which applies personalization techniques to Web Directories. The Web dire...
Dimitrios Pierrakos, Georgios Paliouras