Sciweavers

301 search results - page 6 / 61
» An efficient algorithm to verify generalized false paths
Sort
View
LPAR
2010
Springer
13 years 6 months ago
Verifying Pointer and String Analyses with Region Type Systems
Pointer analysis statically approximates the heap pointer structure during a program execution in order to track heap objects or to establish alias relations between references, a...
Lennart Beringer, Robert Grabowski, Martin Hofmann
STOC
2000
ACM
137views Algorithms» more  STOC 2000»
13 years 12 months ago
On the complexity of verifiable secret sharing and multiparty computation
We first study the problem of doing Verifiable Secret Sharing (VSS) information theoretically secure for a general access structure. We do it in the model where private channels b...
Ronald Cramer, Ivan Damgård, Stefan Dziembow...
IJRR
2000
94views more  IJRR 2000»
13 years 8 months ago
Sensor-Based Exploration: Incremental Construction of the Hierarchical Generalized Voronoi Graph
This paper prescribes an incremental procedure to construct roadmaps of unknown environments. Recall that a roadmap is a geometric structure that a robot uses to plan a path betwe...
Howie Choset, Sean Walker, Kunnayut Eiamsa-Ard, Jo...
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
13 years 8 months ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
14 years 9 months ago
Verifiable Rotation of Homomorphic Encryptions
Similar to verifiable shuffling (or, mixing), we consider the problem of verifiable rotating (and random re-encrypting) a given list of homomorphic encryptions. The offset by which...
Sebastiaan de Hoogh, Berry Schoenmakers, Boris Sko...