Sciweavers

6960 search results - page 422 / 1392
» Continuity Analysis of Programs
Sort
View
99
Voted
CORR
2006
Springer
72views Education» more  CORR 2006»
15 years 5 months ago
A secure archive for Voice-over-IP conversations
An efficient archive securing the integrity of VoIP-based two-party conversations is presented. The solution is based on chains of hashes and continuously chained electronic signa...
Christian Hett, Nicolai Kuntze, Andreas U. Schmidt
139
Voted
CORR
2004
Springer
78views Education» more  CORR 2004»
15 years 4 months ago
Polarity sensitivity and evaluation order in type-logical grammar
We present a novel, type-logical analysis of polarity sensitivity: how negative polarity items (like any and ever) or positive ones (like some) are licensed or prohibited. It take...
Chung-chieh Shan
161
Voted
ESOP
2007
Springer
15 years 11 months ago
Type-Based Analysis of Deadlock for a Concurrent Calculus with Interrupts
The goal of our research project is to establish a type-based method for verification of certain critical properties (such as deadlockand race-freedom) of operating system kernels...
Kohei Suenaga, Naoki Kobayashi
IPPS
2005
IEEE
15 years 10 months ago
Automated Analysis of Memory Access Behavior
Abstract— We developed an automated environment to measure the memory access behavior of applications on high performance clusters. Code optimization for processor caches is cruc...
Michael Gerndt, Tianchao Li
CCS
2005
ACM
15 years 10 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi