Sciweavers

8499 search results - page 76 / 1700
» cans 2009
Sort
View
93
Voted
FM
2009
Springer
124views Formal Methods» more  FM 2009»
15 years 7 months ago
Reasoning about Memory Layouts
Verification methods for memory-manipulating C programs need to address not only well-typed programs that respect invariants such as the split heap memory model, but also programs...
Holger Gast
95
Voted
IFIP
2009
Springer
15 years 7 months ago
Analysing the Information Flow Properties of Object-Capability Patterns
We consider the problem of detecting covert channels within security-enforcing object-capability patterns. Traditional formalisms for reasoning about the security properties of obj...
Toby C. Murray, Gavin Lowe
84
Voted
CDC
2009
IEEE
113views Control Systems» more  CDC 2009»
15 years 5 months ago
Decomposition based least squares estimation algorithm for non-uniformly sampled multirate systems
— In order to reduce the computational load of the recursive least squares (RLS) algorithm, a decomposition based least squares algorithm is developed for non-uniformly sampled m...
Yanjun Liu, Feng Ding
106
Voted
ATMOS
2009
130views Optimization» more  ATMOS 2009»
15 years 1 months ago
Arc-Flags in Dynamic Graphs
Abstract. Computation of quickest paths has undergoing a rapid development in recent years. It turns out that many high-performance route planning algorithms are made up of several...
Emanuele Berrettini, Gianlorenzo D'Angelo, Daniel ...
89
Voted
LATINCRYPT
2010
14 years 11 months ago
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
Let E be a non-supersingular elliptic curve over a finite field Fq. At CRYPTO 2009, Icart introduced a deterministic function Fq → E(Fq) which can be computed efficiently, and ...
Pierre-Alain Fouque, Mehdi Tibouchi