Sciweavers

1304 search results - page 114 / 261
» Model Checking C Programs Using F-SOFT
Sort
View
OOPSLA
2009
Springer
15 years 9 months ago
A type and effect system for deterministic parallel Java
Today’s shared-memory parallel programming models are complex and error-prone. While many parallel programs are intended to be deterministic, unanticipated thread interleavings ...
Robert L. Bocchino Jr., Vikram S. Adve, Danny Dig,...
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 9 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin
CISS
2011
IEEE
14 years 6 months ago
Secret key generation through OFDM multipath channel
—We analyze the fundamental limits of key generation and describe an implementation based on error correcting codes. We show that key extraction based on channel coefficients si...
Yanpei Liu, Stark C. Draper, Akbar M. Sayeed
RSP
2007
IEEE
141views Control Systems» more  RSP 2007»
15 years 9 months ago
Rapid Prototyping of Intrusion Detection Systems
Designing security softwares that evolve as quickly as threats is a truthful challenge. In addition, current software becomes increasingly more complex and difficult to handle ev...
Fabrice Kordon, Jean-Baptiste Voron
IWPC
2002
IEEE
15 years 8 months ago
Slicing Aspect-Oriented Software
Program slicing has many applications in software engineering activities including program comprehension, debugging, testing, maintenance, and model checking. In this paper, we pr...
Jianjun Zhao