Sciweavers

890 search results - page 25 / 178
» Programming language methods in computer security
Sort
View
123
Voted
ACL2
2006
ACM
15 years 6 months ago
An embedding of the ACL2 logic in HOL
We describe an embedding of the ACL2 logic into higherorder logic. An implementation of this embedding allows ACL2 to be used as an oracle for higher-order logic provers. Categori...
Michael J. C. Gordon, Warren A. Hunt Jr., Matt Kau...
95
Voted
FLAIRS
2006
15 years 1 months ago
Computer-Aided Language Processing
The invited talk will introduce Computer-Aided Language Processing (CALP) as an emerging area of practical interest and significance and will present experiments of several CALP a...
Ruslan Mitkov
105
Voted
ICALP
2005
Springer
15 years 6 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
122
Voted
APLAS
2011
ACM
14 years 17 days ago
Decentralized Delimited Release
Abstract. Decentralization is a major challenge for secure computing. In a decentralized setting, principals are free to distrust each other. The key challenge is to provide suppor...
Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld
217
Voted

Book
425views
16 years 10 months ago
Programming Languages: Application and Interpretation
"The book is the textbook for the programming languages course at Brown University, which is taken primarily by third and fourth year undergraduates and beginning graduate (bo...
Shriram Krishnamurthi