Sciweavers

4098 search results - page 34 / 820
» Sound mobility models
Sort
View
FSTTCS
2006
Springer
15 years 3 months ago
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cryptographic point of view, especially in presence of hash functions. In this paper...
Véronique Cortier, Steve Kremer, Ralf K&uum...
IFM
2000
Springer
15 years 3 months ago
ISpec: Towards Practical and Sound Interface Specifications
Abstract. This paper introduces the ISpec approach to interface specification. ISpec supports the development of interface specifications at various levels of formality and detail ...
H. B. M. Jonkers
AAAI
1997
15 years 1 months ago
The Sounds of Silence: Towards Automated Evaluation of Student Learning in a Reading Tutor that Listens
1 We propose a paradigm for ecologically valid, authentic, unobtrusive, automatic, data-rich, fast, robust, and sensitive evaluation of computer-assisted student performance. We i...
Jack Mostow, Gregory Aist
PLDI
2003
ACM
15 years 5 months ago
A provably sound TAL for back-end optimization
Typed assembly languages provide a way to generate machinecheckable safety proofs for machine-language programs. But the soundness proofs of most existing typed assembly languages...
Juan Chen, Dinghao Wu, Andrew W. Appel, Hai Fang
POPL
2008
ACM
16 years 4 days ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk