Sciweavers

1128 search results - page 17 / 226
» Little Engines of Proof
Sort
View
ACISP
2004
Springer
15 years 2 months ago
Protocols with Security Proofs for Mobile Applications
The Canetti-Krawczyk (CK) model is useful for building reusable components that lead to rapid development of secure protocols, especially for engineers working outside of the secur...
Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Bo...
POPL
1997
ACM
15 years 1 months ago
Proof-Carrying Code
Proof-carrying code is a framework for the mechanical verification of safety properties of machine language programs, but the problem arises of quis custodiat ipsos custodes—wh...
George C. Necula
IDEAS
2006
IEEE
99views Database» more  IDEAS 2006»
15 years 3 months ago
Securing the Borealis Data Stream Engine
As data stream management systems (DSMSs) become more and more popular, there is an increasing need to protect such systems from adversaries. In this paper we present an approach ...
Wolfgang Lindner, Jörg Meier
AI
2001
Springer
15 years 1 months ago
The Bottom-Up Freezing: An Approach to Neural Engineering
This paper presents a new pruning method to determine a nearly optimum multi-layer neural network structure. The aim of the proposed method is to reduce the size of the network by ...
Ali Farzan, Ali A. Ghorbani
WWW
2004
ACM
15 years 10 months ago
What's new on the web?: the evolution of the web from a search engine perspective
We seek to gain improved insight into how Web search engines should cope with the evolving Web, in an attempt to provide users with the most up-to-date results possible. For this ...
Alexandros Ntoulas, Junghoo Cho, Christopher Olsto...