Sciweavers

1941 search results - page 352 / 389
» DNA Computing Approach to Construction of Semantic Model
Sort
View
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
14 years 4 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
RAID
2005
Springer
15 years 9 months ago
FLIPS: Hybrid Adaptive Intrusion Prevention
Intrusion detection systems are fundamentally passive and fail–open. Because their primary task is classification, they do nothing to prevent an attack from succeeding. An intru...
Michael E. Locasto, Ke Wang, Angelos D. Keromytis,...
POPL
2008
ACM
16 years 4 months ago
Demand-driven alias analysis for C
This paper presents a demand-driven, flow-insensitive analysis algorithm for answering may-alias queries. We formulate the computation of alias queries as a CFL-reachability probl...
Xin Zheng, Radu Rugina
PLDI
2010
ACM
15 years 8 months ago
Bringing Extensibility to Verified Compilers
Verified compilers, such as Leroy's CompCert, are accompanied by a fully checked correctness proof. Both the compiler and proof are often constructed with an interactive proo...
Zachary Tatlock, Sorin Lerner
ECCV
2006
Springer
16 years 6 months ago
Unsupervised Texture Segmentation with Nonparametric Neighborhood Statistics
Abstract. This paper presents a novel approach to unsupervised texture segmentation that relies on a very general nonparametric statistical model of image neighborhoods. The method...
Suyash P. Awate, Tolga Tasdizen, Ross T. Whitaker