Sciweavers

596 search results - page 56 / 120
» Theories of Access Consciousness
Sort
View
ICFP
2008
ACM
16 years 21 days ago
Ynot: dependent types for imperative programs
We describe an axiomatic extension to the Coq proof assistant, that supports writing, reasoning about, and extracting higher-order, dependently-typed programs with side-effects. C...
Aleksandar Nanevski, Greg Morrisett, Avraham Shinn...
216
Voted

Lecture Notes
404views
16 years 10 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
97
Voted
CHI
2006
ACM
16 years 1 months ago
Urbanhermes: social signaling with electronic fashion
Fashion signals are displayed to indicate access to information. Consistent, timely, and meaningful signal displays are only made possible if one is well-connected. While fashion ...
Christine M. Liu, Judith S. Donath
PPDP
2009
Springer
15 years 7 months ago
Relational semantics for effect-based program transformations: higher-order store
We give a denotational semantics to a type and effect system tracking reading and writing to global variables holding values that may include higher-order effectful functions. Reï...
Nick Benton, Andrew Kennedy, Lennart Beringer, Mar...
85
Voted
SAGT
2009
Springer
136views Game Theory» more  SAGT 2009»
15 years 7 months ago
Doing Good with Spam Is Hard
We study economic means to improve network performance in the well-known game theoretic traffic model due to Wardrop. We introduce two sorts of spam flow - auxiliary and adversari...
Martin Hoefer, Lars Olbrich, Alexander Skopalik