Sciweavers

4305 search results - page 281 / 861
» Analysing Protocol Implementations
Sort
View
CUZA
2004
81views more  CUZA 2004»
15 years 2 months ago
The Quick Check Pre-unification Filter for Typed Grammars: Further Advances
We present several significant improvements in the implementation of the quick check pre-unification filter [7] [10], and the potential way in which the design of the quick check [...
Liviu-Virgil Ciortuz
106
Voted
JAIHC
2010
134views more  JAIHC 2010»
15 years 1 months ago
Towards a new human-centred computing methodology for cooperative ambient intelligence
Cooperative ambient intelligence aims to improve users’ work and private life by analysing their current situation with a special focus on their social interaction and to adapt t...
Tom Gross
GI
2009
Springer
15 years 10 days ago
Automatic Population and Updating of a Semantic Wiki-based Configuration Management Database
Abstract: This paper describes our work on designing and implementing a component for automatically integrating and updating information about configuration items into a Semantic W...
Frank Kleiner, Andreas Abecker, Ning Liu
145
Voted
CRYPTO
2010
Springer
181views Cryptology» more  CRYPTO 2010»
15 years 3 months ago
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
Due to its universality oblivious transfer (OT) is a primitive of great importance in secure multi-party computation. OT is impossible to implement from scratch in an unconditional...
Severin Winkler, Jürg Wullschleger
PODS
2005
ACM
136views Database» more  PODS 2005»
16 years 2 months ago
Context-sensitive program analysis as database queries
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...