Sciweavers

3825 search results - page 80 / 765
» The Language of Time: A Reader
Sort
View
CIIT
2004
132views Communications» more  CIIT 2004»
14 years 11 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
CLEF
2009
Springer
14 years 7 months ago
Unsupervised Morphological Analysis by Formal Analogy
Abstract. While classical approaches to unsupervised morphology acquisition often rely on metrics based on information theory for identifying morphemes, we describe a novel approac...
Jean-François Lavallée, Philippe Lan...
ICONFERENCE
2011
14 years 4 months ago
Lifting the veil: the expression of values in online communities
Wikipedia’s stated mission is to provide a free encyclopedia that people all over the world can use and contribute to. However, while Wikipedia is successful at providing access...
Jonathan T. Morgan, Robert M. Mason, Karine Nahon
PLDI
2012
ACM
13 years 9 days ago
Language-based control and mitigation of timing channels
We propose a new language-based approach to mitigating timing channels. In this language, well-typed programs provably leak only a bounded amount of information over time through ...
Danfeng Zhang, Aslan Askarov, Andrew C. Myers
FPCA
1989
15 years 1 months ago
Automatic Complexity Analysis
One way to analyse programs is to to derive expressions for their computational behaviour. A time bound function (or worst-case complexity) gives an upper bound for the computatio...
Mads Rosendahl