Sciweavers

1061 search results - page 39 / 213
» A general definition of malware
Sort
View
CCS
2010
ACM
13 years 6 months ago
Platform-independent programs
Given a single program (i.e., bit string), one may assume that the program's behaviors can be determined by first identifying the native runtime architecture and then executi...
Sang Kil Cha, Brian Pak, David Brumley, Richard Ja...
NMR
2004
Springer
14 years 1 months ago
The structural model interpretation of the NESS test
Within the law, the traditional test for attributing causal responsibility is the counterfactual “but-for” test, which asks whether the injury complained of would have occurre...
Richard A. Baldwin, Eric Neufeld
CSFW
2008
IEEE
13 years 10 months ago
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus
We present a general technique for modeling remote electronic voting protocols in the applied pi-calculus and for automatically verifying their security. In the first part of this...
Michael Backes, Catalin Hritcu, Matteo Maffei
CORR
2004
Springer
91views Education» more  CORR 2004»
13 years 8 months ago
Metrics for more than two points at once
The conventional definition of a topological metric over a space specifies properties that must be obeyed by any measure of "how separated" two points in that space are....
David Wolpert
ENTCS
2002
78views more  ENTCS 2002»
13 years 8 months ago
Slicing Synchronous Reactive Programs
This paper extends the well-known technique of slicing to synchronous reactive programs. Synchronous languages exemplified by Esterel, Lustre, Signal and Argos, novel model of exe...
Vinod Ganapathy, S. Ramesh