Sciweavers

2486 search results - page 126 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
JNW
2006
55views more  JNW 2006»
13 years 8 months ago
On Stochastic Modeling for Integrated Security and Dependability Evaluation
This paper presents a new approach to integrated security and dependability evaluation, which is based on stochastic modeling techniques. Our proposal aims to provide operational m...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...
CHI
2003
ACM
14 years 9 months ago
Women go with the (optical) flow
Previous research reported interesting gender effects involving specific benefits for females navigating with wider fields of view on large displays. However, it was not clear wha...
Desney S. Tan, Mary Czerwinski, George G. Robertso...
CDC
2008
IEEE
166views Control Systems» more  CDC 2008»
13 years 11 months ago
Distributed coverage verification in sensor networks without location information
In this paper, we present a series of distributed algorithms for coverage verification in sensor networks with no location information. We demonstrate how, in the absence of locali...
Alireza Tahbaz-Salehi, Ali Jadbabaie
ICTAC
2005
Springer
14 years 2 months ago
Revisiting Failure Detection and Consensus in Omission Failure Environments
It has recently been shown that fair exchange, a security problem in distributed systems, can be reduced to a fault tolerance problem, namely a special form of distributed consensu...
Carole Delporte-Gallet, Hugues Fauconnier, Felix C...
PADL
2012
Springer
12 years 4 months ago
Typing the Numeric Tower
In the past, the creators of numerical programs had to choose between simple expression of mathematical formulas and static type checking. While the Lisp family and its dynamically...
Vincent St-Amour, Sam Tobin-Hochstadt, Matthew Fla...