Sciweavers

506 search results - page 44 / 102
» Proving Properties about Lists Using Containers
Sort
View
TOPLAS
2002
98views more  TOPLAS 2002»
14 years 9 months ago
Data abstraction and information hiding
traction and information hiding K. RUSTAN M. LEINO and GREG NELSON Compaq Systems Research Center er describes an approach for verifying programs in the presence of data abstractio...
K. Rustan M. Leino, Greg Nelson
CORR
2007
Springer
104views Education» more  CORR 2007»
14 years 9 months ago
Sources of Superlinearity in Davenport-Schinzel Sequences
A generalized Davenport-Schinzel sequence is one over a finite alphabet that contains no subsequences isomorphic to a fixed forbidden subsequence. One of the fundamental problem...
Seth Pettie
CAV
2007
Springer
110views Hardware» more  CAV 2007»
15 years 4 months ago
Hector: Software Model Checking with Cooperating Analysis Plugins
We present Hector, a software tool for combining different abstraction methods to extract sound models of heap-manipulating imperative programs with recursion. Extracted models ma...
Nathaniel Charlton, Michael Huth
CRYPTO
2007
Springer
116views Cryptology» more  CRYPTO 2007»
15 years 4 months ago
Random Oracles and Auxiliary Input
We introduce a variant of the random oracle model where oracle-dependent auxiliary input is allowed. In this setting, the adversary gets an auxiliary input that can contain informa...
Dominique Unruh
ICDT
2010
ACM
172views Database» more  ICDT 2010»
15 years 2 months ago
k-jump strategy for preserving privacy in micro-data disclosure
In disclosing micro-data with sensitive attributes, the goal is usually two fold. First, the data utility of disclosed data should be maximized for analysis purposes. Second, the ...
Wen Ming Liu, Lingyu Wang, Lei Zhang