Sciweavers

1528 search results - page 154 / 306
» Implementing Generalized Operator Overloading
Sort
View
POPL
2007
ACM
15 years 10 months ago
JavaScript instrumentation for browser security
It is well recognized that JavaScript can be exploited to launch browser-based security attacks. We propose to battle such attacks using program instrumentation. Untrusted JavaScr...
Dachuan Yu, Ajay Chander, Nayeem Islam, Igor Serik...
ESORICS
2005
Springer
15 years 3 months ago
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
The abstraction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently si...
Michael Backes, Birgit Pfitzmann
COMPGEOM
2008
ACM
14 years 11 months ago
Robust construction of the three-dimensional flow complex
The Delaunay triangulation and its dual the Voronoi diagram are ubiquitous geometric complexes. From a topological standpoint, the connection has recently been made between these ...
Frédéric Cazals, Aditya G. Parameswa...
CN
2002
82views more  CN 2002»
14 years 9 months ago
Optimal allocation of electronic content
Abstract-The delivery of large files to single users, such as application programs for some versions of the envisioned network computer, or movies, is expected by many to be one of...
Israel Cidon, Shay Kutten, Ran Soffer
ICCV
1999
IEEE
15 years 12 months ago
Control in a 3D Reconstruction System using Selective Perception
This paper presents a control structure for general purpose image understanding that addresses both the high level of uncertainty in local hypotheses and the computational complex...
Maurício Marengoni, Allen R. Hanson, Shlomo...