Sciweavers

1833 search results - page 67 / 367
» Mechanized Verification with Sharing
Sort
View
90
Voted
SERP
2003
15 years 2 months ago
Polymorphism in Object-Oriented Contract Verification
The role that design by contract plays in the specification, monitoring, and reuse of classes is of increasing importance in the OO community. Although recognizably useful, neverth...
Isabel Nunes
204
Voted
POPL
2009
ACM
16 years 1 months ago
A calculus of atomic actions
We present a proof calculus and method for the static verification of assertions and procedure specifications in shared-memory concurrent programs. The key idea in our approach is...
Tayfun Elmas, Shaz Qadeer, Serdar Tasiran
105
Voted
ESORICS
2008
Springer
15 years 2 months ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...
118
Voted
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
15 years 2 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
116
Voted
BCSHCI
2008
15 years 2 months ago
The roles of time, place, value and relationships in collocated photo sharing with camera phones
Photo sharing on camera phones is becoming a common way to maintain closeness and relationships with friends and family. How people share their photos in collocated settings using...
Hanna Stelmaszewska, Bob Fields, Ann Blandford