Sciweavers

1275 search results - page 72 / 255
» A Simple Focused Crawler
Sort
View
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
15 years 10 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
113
Voted
CISIS
2009
IEEE
15 years 10 months ago
Application of a Critical Chain Project Management Based Framework on Max-Plus Linear Systems
Abstract. We focus on discrete event systems with a structure of parallel processing, synchronization, and noconcurrency. We use max-plus algebra, which is an effective approach fo...
Hirotaka Takahashi, Hiroyuki Goto, Munenori Kasaha...
96
Voted
CP
2009
Springer
15 years 10 months ago
Closing the Open Shop: Contradicting Conventional Wisdom
This paper describes a new approach for solving disjunctive temporal problems such as the open shop and job shop scheduling domains. Much previous research in systematic search app...
Diarmuid Grimes, Emmanuel Hebrard, Arnaud Malapert
98
Voted
TACAS
2009
Springer
134views Algorithms» more  TACAS 2009»
15 years 10 months ago
Compositional Predicate Abstraction from Game Semantics
ional Predicate Abstraction from Game Semantics Adam Bakewell and Dan R. Ghica University of Birmingham, U.K. We introduce a technique for using conventional predicate abstraction ...
Adam Bakewell, Dan R. Ghica
146
Voted
CSFW
2009
IEEE
15 years 10 months ago
Securing Timeout Instructions in Web Applications
Timeout mechanisms are a useful feature for web applications. However, these mechanisms need to be used with care because, if used as-is, they are vulnerable to timing attacks. Th...
Alejandro Russo, Andrei Sabelfeld