Sciweavers

1646 search results - page 132 / 330
» Automatic generation of two-party computations
Sort
View
CSFW
2007
IEEE
14 years 2 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
EUROPAR
2009
Springer
14 years 2 months ago
POGGI: Puzzle-Based Online Games on Grid Infrastructures
Massively Multiplayer Online Games (MMOGs) currently entertain millions of players daily. To keep these players online and generate revenue, MMOGs are currently relying on manually...
Alexandru Iosup
SIGMOD
2004
ACM
107views Database» more  SIGMOD 2004»
14 years 8 months ago
Declarative Specification of Web Applications exploiting Web Services and Workflows
This demo presents an extension of a declarative language for specifying data-intensive Web applications. We demonstrate a scenario extracted from a real-life application, the Web...
Marco Brambilla, Stefano Ceri, Sara Comai, Marco D...
EUROPAR
2004
Springer
14 years 1 months ago
Evaluating OpenMP Performance Analysis Tools with the APART Test Suite
The APART working group is developing the APART Test Suite (ATS) for evaluating (automatic) performance analysis tools with respect to their correctness – that is, their ability...
Michael Gerndt, Bernd Mohr, Jesper Larsson Trä...
ENTCS
2007
124views more  ENTCS 2007»
13 years 8 months ago
Blues for Gary: Design Abstractions for a Jazz Improvisation Assistant
bstractions for a Jazz Improvisation Assistant Robert Keller1 Martin Hunt, Stephen Jones, David Morrison, Aaron Wolin Computer Science Harvey Mudd College Claremont, California, US...
Robert Keller, Martin Hunt, Stephen Jones, David M...