Sciweavers

32032 search results - page 113 / 6407
» Verified programming in Guru
Sort
View
POPL
2008
ACM
16 years 1 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
ACNS
2004
Springer
133views Cryptology» more  ACNS 2004»
15 years 4 months ago
Limited Verifier Signature from Bilinear Pairings
Motivated by the conflict between authenticity and privacy in the digital signature, the notion of limited verifier signature was introduced [1]. The signature can be verified by a...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
93
Voted
ICPPW
2002
IEEE
15 years 6 months ago
A Programming Methodology for Designing Block Recursive Algorithms on Various Computer Networks
In this paper, we use the tensor product notation as the framework of a programming methodology for designing block recursive algorithms on various computer networks. In our previ...
Min-Hsuan Fan, Chua-Huang Huang, Yeh-Ching Chung
64
Voted
VIS
2009
IEEE
162views Visualization» more  VIS 2009»
16 years 2 months ago
Verifiable Visualization for Isosurface Extraction
Tiago Etiene, Carlos Scheidegger, L. Gustavo Non...
103
Voted
SEUS
2005
IEEE
15 years 6 months ago
Development of Distributed Programming Developing Tool-Kit Based on Object Group Model
In this paper, we defined the concept of the grouped distributed objects[10-14], as a logical unit of distributed application service, and developed a distributed programming deve...
Jeong-Taek Lim, Su-Chong Joo, Chang-Sun Shin