Sciweavers

6293 search results - page 1075 / 1259
» Information Flow Testing
Sort
View
ECCC
2007
144views more  ECCC 2007»
15 years 4 months ago
Algebraic Lower Bounds for Computing on Encrypted Data
In cryptography, there has been tremendous success in building primitives out of homomorphic semantically-secure encryption schemes, using homomorphic properties in a blackbox way...
Rafail Ostrovsky, William E. Skeith III
JIPS
2006
59views more  JIPS 2006»
15 years 4 months ago
A Light-weight and Dynamically Reconfigurable RMON Agent System
: A RMON agent system, which locates on a subnet, collects the network traffic information for management by retrieving and analyzing all of the packets on the subnet. The RMON age...
Jun-Hyung Lee, Zinwon Park, Myung-Kyun Kim
ENTCS
2007
126views more  ENTCS 2007»
15 years 4 months ago
Nominal Reasoning Techniques in Coq: (Extended Abstract)
d Abstract) Brian Aydemir Aaron Bohannon Stephanie Weirich Department of Computer and Information Science University of Pennsylvania Philadelphia, PA, USA We explore an axiomatize...
Brian E. Aydemir, Aaron Bohannon, Stephanie Weiric...
ML
2008
ACM
109views Machine Learning» more  ML 2008»
15 years 4 months ago
O'browser: objective caml on browsers
We present a way to run Objective Caml programs on a standard, unmodified web browser, with a compatible data representation and execution model, including concurrency. To achieve...
Benjamin Canou, Vincent Balat, Emmanuel Chailloux
JUCS
2006
92views more  JUCS 2006»
15 years 4 months ago
Program Slicing by Calculation
: Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful ...
Nuno F. Rodrigues, Luís Soares Barbosa
« Prev « First page 1075 / 1259 Last » Next »