Sciweavers

5344 search results - page 385 / 1069
» Privacy-Preserving Set Operations
Sort
View
POPL
2010
ACM
16 years 2 months ago
Counterexample-Guided Focus
The automated inference of quantified invariants is considered one of the next challenges in software verification. The question of the right precision-efficiency tradeoff for the...
Andreas Podelski, Thomas Wies
SOSP
2007
ACM
16 years 1 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
ICDE
2009
IEEE
114views Database» more  ICDE 2009»
15 years 11 months ago
A Spreadsheet Algebra for a Direct Data Manipulation Query Interface
— A spreadsheet-like “direct manipulation” interface is more intuitive for many non-technical database users compared to traditional alternatives, such as visual query builde...
Bin Liu, H. V. Jagadish
161
Voted
TABLEAUX
2009
Springer
15 years 11 months ago
Tableaux and Model Checking for Memory Logics
Memory logics are modal logics whose semantics is specified in terms of relational models enriched with additional data structure to represent memory. The logical language is then...
Carlos Areces, Diego Figueira, Daniel Gorín...
131
Voted
FCCM
2006
IEEE
131views VLSI» more  FCCM 2006»
15 years 11 months ago
Packet Switched vs. Time Multiplexed FPGA Overlay Networks
— Dedicated, spatially configured FPGA interconnect is efficient for applications that require high throughput connections between processing elements (PEs) but with a limited ...
Nachiket Kapre, Nikil Mehta, Michael DeLorimier, R...