Sciweavers

1034 search results - page 80 / 207
» Small Pi01 Classes
Sort
View
96
Voted
CSFW
2011
IEEE
13 years 10 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
90
Voted
OOPSLA
1995
Springer
15 years 2 months ago
Using a Prototype-based Language for User Interface: The Newton Project's Experience
Object-oriented user interface frameworks are usually implemented in a class-based language. We chose instead to develop a prototype-based language, NewtonScript, for this purpose...
Walter R. Smith
88
Voted
ACS
2004
14 years 10 months ago
Descent for Discrete (Co)fibrations
: We characterize the (effective) E-descent morphisms in the category Cat of small categories, when E is the class of discrete fibrations or the one of discrete cofibrations, and p...
Manuela Sobral
IJCAI
2007
15 years 11 days ago
Locating Complex Named Entities in Web Text
Named Entity Recognition (NER) is the task of locating and classifying names in text. In previous work, NER was limited to a small number of predefined entity classes (e.g., peop...
Doug Downey, Matthew Broadhead, Oren Etzioni
71
Voted
IANDC
2008
120views more  IANDC 2008»
14 years 11 months ago
A framework for compositional verification of security protocols
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysi...
Suzana Andova, Cas J. F. Cremers, Kristian Gj&osla...