Sciweavers

1785 search results - page 231 / 357
» Framework of Agile Patterns
Sort
View
AGI
2011
14 years 4 months ago
Delusion, Survival, and Intelligent Agents
Abstract. This paper considers the consequences of endowing an intelligent agent with the ability to modify its own code. The intelligent agent is patterned closely after AIXI with...
Mark Ring, Laurent Orseau
SAC
2011
ACM
14 years 4 months ago
Reliable protection against session fixation attacks
The term ‘Session Fixation vulnerability’ subsumes issues in Web applications that under certain circumstances enable the adversary to perform a Session Hijacking attack throu...
Martin Johns, Bastian Braun, Michael Schrank, Joac...
CRYPTO
2011
Springer
222views Cryptology» more  CRYPTO 2011»
14 years 29 days ago
Computer-Aided Security Proofs for the Working Cryptographer
Abstract. We present EasyCrypt, an automated tool for elaborating security proofs of cryptographic systems from proof sketches—compact, formal representations of the essence of a...
Gilles Barthe, Benjamin Grégoire, Sylvain H...
CORR
2012
Springer
163views Education» more  CORR 2012»
13 years 9 months ago
The Structure of Signals: Causal Interdependence Models for Games of Incomplete Information
Traditional economic models typically treat private information, or signals, as generated from some underlying state. Recent work has explicated alternative models, where signals ...
Michael P. Wellman, Lu Hong, Scott E. Page
TOCS
2012
13 years 3 months ago
A File Is Not a File: Understanding the I/O Behavior of Apple Desktop Applications
We analyze the I/O behavior of iBench, a new collection of productivity and multimedia application workloads. Our analysis reveals a number of differences between iBench and typic...
Tyler Harter, Chris Dragga, Michael Vaughn, Andrea...