Sciweavers

400 search results - page 32 / 80
» Reasoning About Hidden Mechanisms
Sort
View
FUIN
2008
91views more  FUIN 2008»
14 years 12 months ago
A Deductive Proof System for Multithreaded Java with Exceptions
Abstract. Besides the features of a class-based object-oriented language, Java integrates concurrency via its thread-classes, allowing for a multithreaded flow of control. Besides ...
Erika Ábrahám, Frank S. de Boer, Wil...
ENTCS
2007
79views more  ENTCS 2007»
14 years 11 months ago
Towards Trustworthy Spatial Messaging
Spatial messaging is a term that defines the virtual publication of data in physical places. Generally, anyone in the neighborhood of such a publication point gets the message. F...
Michel Deriaz, Jean-Marc Seigneur
SIGSOFT
2008
ACM
16 years 16 days ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
AAAI
1997
15 years 1 months ago
The "Inverse Hollywood Problem": From Video to Scripts and Storyboards via Causal Analysis
We address the problem of visually detecting causal events and tting them together into a coherent story of the action witnessed by the camera. We show that this can be done by re...
Matthew Brand
JOC
2002
99views more  JOC 2002»
14 years 11 months ago
The Insecurity of the Digital Signature Algorithm with Partially Known Nonces
We present a polynomial-time algorithm that provably recovers the signer's secret DSA key when a few bits of the random nonces k (used at each signature generation) are known ...
Phong Q. Nguyen, Igor Shparlinski