Sciweavers

1407 search results - page 272 / 282
» Using Use Cases in Executable Z
Sort
View
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 1 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
ICSE
2011
IEEE-ACM
14 years 29 days ago
Always-available static and dynamic feedback
Developers who write code in a statically typed language are denied the ability to obtain dynamic feedback by executing their code during periods when it fails the static type che...
Michael Bayne, Richard Cook, Michael D. Ernst
SIGSOFT
2004
ACM
15 years 10 months ago
PSE: explaining program failures via postmortem static analysis
In this paper, we describe PSE (Postmortem Symbolic Evaluation), a static analysis algorithm that can be used by programmers to diagnose software failures. The algorithm requires ...
Roman Manevich, Manu Sridharan, Stephen Adams, Man...
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
15 years 10 months ago
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be st...
Yehuda Lindell, Hila Zarosim
KDD
2009
ACM
260views Data Mining» more  KDD 2009»
15 years 10 months ago
Enabling analysts in managed services for CRM analytics
Data analytics tools and frameworks abound, yet rapid deployment of analytics solutions that deliver actionable insights from business data remains a challenge. The primary reason...
Indrajit Bhattacharya, Shantanu Godbole, Ajay Gupt...