Sciweavers

537 search results - page 86 / 108
» tools 1999
Sort
View
LICS
1999
IEEE
15 years 2 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
METRICS
1999
IEEE
15 years 2 months ago
Metrics for Quantifying the Disparity, Concentration, and Dedication between Program Components and Features
One of the most important steps towards effective software maintenance of a large complicated system is to understand how program features are spread over the entire system and th...
W. Eric Wong, Swapna S. Gokhale, Joseph Robert Hor...
ERSHOV
1999
Springer
15 years 2 months ago
Current Directions in Hyper-Programming
The traditional representation of a program is as a linear sequence of text. At some stage in the execution sequence the source text is checked for type correctness and its transla...
Ronald Morrison, Richard C. H. Connor, Quintin I. ...
EUROCOLT
1999
Springer
15 years 2 months ago
Regularized Principal Manifolds
Many settings of unsupervised learning can be viewed as quantization problems — the minimization of the expected quantization error subject to some restrictions. This allows the ...
Alex J. Smola, Robert C. Williamson, Sebastian Mik...
FC
1999
Springer
184views Cryptology» more  FC 1999»
15 years 2 months ago
Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems
Abstract. Anonymity features of electronic payment systems are important for protecting privacy in an electronic world. However, complete anonymity prevents monitoring financial t...
Tomas Sander, Amnon Ta-Shma