Sciweavers

1781 search results - page 43 / 357
» Visualizing program execution using user abstractions
Sort
View
CASCON
1996
101views Education» more  CASCON 1996»
15 years 3 months ago
Design patterns in enterprise
The Enterprise parallel programming system allows programmers to create, compile, execute, and debug parallel applications that execute over a network of workstations. The run-tim...
Steve MacDonald
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 5 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
CRYPTO
2008
Springer
98views Cryptology» more  CRYPTO 2008»
15 years 3 months ago
One-Time Programs
Abstract. In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, who...
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothbl...
PERVASIVE
2009
Springer
15 years 8 months ago
Situvis: A Visual Tool for Modeling a User's Behaviour Patterns in a Pervasive Environment
Abstract. One of the key challenges faced when developing contextaware pervasive systems is to capture the set of inputs that we want a system to adapt to. Arbitrarily specifying r...
Adrian K. Clear, Ross Shannon, Thomas Holland, Aar...
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
15 years 5 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...