Sciweavers

313 search results - page 48 / 63
» Error Correction Based on Verification Techniques
Sort
View
79
Voted
ICSE
2004
IEEE-ACM
15 years 9 months ago
Static Checking of Dynamically Generated Queries in Database Applications
Many data-intensive applications dynamically construct queries in response to client requests and execute them. Java servlets, e.g., can create string representations of SQL queri...
Carl Gould, Zhendong Su, Premkumar T. Devanbu
ICB
2009
Springer
185views Biometrics» more  ICB 2009»
15 years 4 months ago
Pose Invariant Palmprint Recognition
Abstract. A palmprint based authentication system that can work with a multipurpose camera in uncontrolled circumstances, such as those mounted on a laptop, mobile device or those ...
Chhaya Methani, Anoop M. Namboodiri
TCC
2004
Springer
105views Cryptology» more  TCC 2004»
15 years 3 months ago
Unfair Noisy Channels and Oblivious Transfer
In a paper from EuroCrypt’99, Damg˚ard, Kilian and Salvail show various positive and negative results on constructing Bit Commitment (BC) and Oblivious Transfer (OT) from Unfair...
Ivan Damgård, Serge Fehr, Kirill Morozov, Lo...
166
Voted
POPL
2005
ACM
15 years 10 months ago
Permission accounting in separation logic
A lightweight logical approach to race-free sharing of heap storage between concurrent threads is described, based on the notion of permission to access. Transfer of permission be...
Richard Bornat, Cristiano Calcagno, Peter W. O'Hea...
ICSE
2007
IEEE-ACM
15 years 9 months ago
Usability Implications of Requiring Parameters in Objects' Constructors
The usability of APIs is increasingly important to programmer productivity. Based on experience with usability studies of specific APIs, techniques were explored for studying the ...
Jeffrey Stylos, Steven Clarke