Sciweavers

519 search results - page 29 / 104
» How to make secure email easier to use
Sort
View
PLDI
2010
ACM
15 years 7 months ago
Complete Functional Synthesis
Synthesis of program fragments from specifications can make programs easier to write and easier to reason about. To integrate synthesis into programming languages, synthesis algor...
Viktor Kuncak, Mika l Mayer, Ruzica Piskac, Philip...
ASYNC
2005
IEEE
174views Hardware» more  ASYNC 2005»
15 years 3 months ago
Delay Insensitive Encoding and Power Analysis: A Balancing Act
Unprotected cryptographic hardware is vulnerable to a side-channel attack known as Differential Power Analysis (DPA). This attack exploits data-dependent power consumption of a co...
Konrad J. Kulikowski, Ming Su, Alexander B. Smirno...
GECCO
2007
Springer
196views Optimization» more  GECCO 2007»
15 years 3 months ago
Pareto optimal search based refactoring at the design level
Refactoring aims to improve the quality of a software systems’ structure, which tends to degrade as the system evolves. While manually determining useful refactorings can be cha...
Mark Harman, Laurence Tratt
DIGITALCITIES
1998
Springer
15 years 1 months ago
Silhouettell: Awareness Support for Real-World Encounter
We have developed a system, called Silhouettell, that provides awareness support for real-world encounters. Silhouettell uses a large graphics screen. People's locations (who ...
Masayuki Okamoto, Hideyuki Nakanishi, Toshikazu Ni...
POPL
2000
ACM
15 years 2 months ago
Enforcing Trace Properties by Program Transformation
We propose an automatic method to enforce trace properties on programs. The programmer specifies the property separately from the program; a program transformer takes the program...
Thomas Colcombet, Pascal Fradet