Sciweavers

262 search results - page 44 / 53
» Model-Based Design of Volatile Functionality in Web Applicat...
Sort
View
APLAS
2010
ACM
14 years 9 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
PET
2010
Springer
15 years 1 months ago
Collaborative, Privacy-Preserving Data Aggregation at Scale
Combining and analyzing data collected at multiple locations is critical for a wide variety of applications, such as detecting and diagnosing malicious attacks or computing an acc...
Benny Applebaum, Haakon Ringberg, Michael J. Freed...
EUROSYS
2008
ACM
15 years 6 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
MHCI
2009
Springer
15 years 4 months ago
Using handheld devices for mobile interaction with displays in home environments
An increasing number of households are equipped with a large number of TV sets and more and more of them are large highresolution displays. Furthermore, we see the integration of ...
Andreas Lorenz, Clara Fernandez De Castro, Enrico ...
67
Voted
LREC
2008
130views Education» more  LREC 2008»
14 years 11 months ago
COLDIC, a Lexicographic Platform for LMF compliant lexica
Despite of the importance of lexical resources for a number of NLP applications (Machine Translation, Information Extraction, Event Detection and Tracking, Question Answering, amo...
Núria Bel, Sergio Espeja, Montserrat Marimo...