We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
odular Abstraction Refinement Thomas A. Henzinger1 , Ranjit Jhala1 , Rupak Majumdar1 , and Shaz Qadeer2 1 University of California, Berkeley 2 Microsoft Research, Redmond Abstract....
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar,...
J-DOS provides and integrated JAVA environment for the execution of a program across an interconnected network of heterogeneous computers. The system provides a file system, shar...
Whilst much effort has been put into the creation of routing algorithms to handle all sorts of mobility scenarios in ad-hoc networks, other fundamental issues, such as the addresse...
The demography of anchovy fishes in the Gulf of Biscay seems to be related to the presence of socalled "retentive" hydrodynamical structures, that keep fish eggs and larv...
Marc Segond, Denis Robilliard, Virginie Marion-Pot...