Sciweavers

5255 search results - page 281 / 1051
» Formal Methods for Privacy
Sort
View
ACISP
2007
Springer
15 years 8 months ago
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography
This paper presents a new approach to precompute all odd points [3]P, [5]P, . . . , [2k - 1]P, k 2 on an elliptic curve over Fp. Those points are required for the efficient evalua...
Erik Dahmen, Katsuyuki Okeya, Daniel Schepers
SODA
2010
ACM
174views Algorithms» more  SODA 2010»
15 years 2 months ago
Differentially Private Combinatorial Optimization
Consider the following problem: given a metric space, some of whose points are "clients," select a set of at most k facility locations to minimize the average distance f...
Anupam Gupta, Katrina Ligett, Frank McSherry, Aaro...
COMPSAC
1999
IEEE
15 years 8 months ago
Detecting Null Pointer Violations in Java Programs
The use of formal methods has been growing steadily and there have been a number of successful applications of formal methods in a range of application areas. It seems agreed that...
Xiaoping Jia, Sushant Sawant, Jiangyu Zhou, Sotiri...
FM
1999
Springer
161views Formal Methods» more  FM 1999»
15 years 8 months ago
Combining Theorem Proving and Continuous Models in Synchronous Design
Support for system speci cation in terms of modelling and simulation environments has become a common practice in safety-critical applications. Also, a current trend is the automat...
Simin Nadjm-Tehrani, Ove Åkerlund
FM
2005
Springer
132views Formal Methods» more  FM 2005»
15 years 10 months ago
Decoupling in Object Orientation
In formal design, decoupling means to make the features of a formal system as independent as possible from each other. Decoupling tends to make the features semantically more primi...
Ioannis T. Kassios