Sciweavers

286 search results - page 23 / 58
» Crypto Engineering: Some History and Some Case Studies
Sort
View
ECOOPWEXCEPTION
2006
Springer
15 years 3 months ago
Exception-Handling Bugs in Java and a Language Extension to Avoid Them
It is difficult to write programs that behave correctly in the presence of exceptions. We describe a dataflow analysis for finding a certain class of mistakes made while programs h...
Westley Weimer
CIDR
2009
181views Algorithms» more  CIDR 2009»
15 years 28 days ago
The Case for RodentStore: An Adaptive, Declarative Storage System
Recent excitement in the database community surrounding new applications--analytic, scientific, graph, geospatial, etc.--has led to an explosion in research on database storage sy...
Philippe Cudré-Mauroux, Eugene Wu, Samuel M...
FS
2010
95views more  FS 2010»
14 years 10 months ago
Pricing credit derivatives under incomplete information: a nonlinear-filtering approach
This paper considers a general reduced form pricing model for credit derivatives where default intensities are driven by some factor process X. The process X is not directly observ...
Rüdiger Frey, Wolfgang Runggaldier
RE
2004
Springer
15 years 5 months ago
The Effect of Trust Assumptions on the Elaboration of Security Requirements
Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
RE
2006
Springer
14 years 11 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...