Sciweavers

2137 search results - page 188 / 428
» Proving Abstract Non-interference
Sort
View
FSE
2007
Springer
104views Cryptology» more  FSE 2007»
15 years 9 months ago
How to Enrich the Message Space of a Cipher
Abstract. Given (deterministic) ciphers E and E that can encipher messages of l and n bits, respectively, we construct a cipher E∗ = XLS[E, E] that can encipher messages of l + s...
Thomas Ristenpart, Phillip Rogaway
FSEN
2007
Springer
15 years 9 months ago
A Model of Component-Based Programming
Abstract. Component-based programming is about how to create application programs from prefabricated components with new software that provides both glue between the components, an...
Xin Chen, Jifeng He, Zhiming Liu, Naijun Zhan
119
Voted
FSEN
2007
Springer
15 years 9 months ago
Hoare Logic for ARM Machine Code
This paper shows how a machine-code Hoare logic is used to lift reasoning from the tedious operational model of a machine lana manageable level of abstraction without making simpli...
Magnus O. Myreen, Anthony C. J. Fox, Michael J. C....
FSTTCS
2007
Springer
15 years 9 months ago
Automata and Logics for Timed Message Sequence Charts
Abstract. We provide a framework for distributed systems that impose timing constraints on their executions. We propose a timed model of communicating finite-state machines, which...
S. Akshay, Benedikt Bollig, Paul Gastin
ICANN
2007
Springer
15 years 9 months ago
Multi-dimensional Recurrent Neural Networks
Abstract. Recurrent neural networks (RNNs) have proved effective at one dimensional sequence learning tasks, such as speech and online handwriting recognition. Some of the properti...
Alex Graves, Santiago Fernández, Jürge...