Sciweavers

1646 search results - page 272 / 330
» Automatic generation of two-party computations
Sort
View
VLSID
2003
IEEE
180views VLSI» more  VLSID 2003»
14 years 10 months ago
Automating Formal Modular Verification of Asynchronous Real-Time Embedded Systems
Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often fl...
Pao-Ann Hsiung, Shu-Yu Cheng
ICSE
2005
IEEE-ACM
14 years 10 months ago
Safe query objects: statically typed objects as remotely executable queries
When building scalable systems that involve general-purpose computation and persistent data, object-oriented languages and relational databases are often essential components. Yet...
William R. Cook, Siddhartha Rai
ICSE
2007
IEEE-ACM
14 years 10 months ago
Path-Sensitive Inference of Function Precedence Protocols
Function precedence protocols define ordering relations among function calls in a program. In some instances, precedence protocols are well-understood (e.g., a call to pthread mut...
Murali Krishna Ramanathan, Ananth Grama, Suresh Ja...
PERCOM
2007
ACM
14 years 9 months ago
Supporting Mobile Service Usage through Physical Mobile Interaction
Although mobile services can be used ubiquitously, their employment and the interaction with them are still restricted by the constraints of mobile devices. In order to facilitate...
Gregor Broll, Sven Siorpaes, Enrico Rukzio, Massim...
PERCOM
2007
ACM
14 years 9 months ago
Using Digital Cameras for Text Input on Mobile Devices
This paper presents novel text input methods for mobile devices. In particular, it shows how users can capture text from books, newspapers, and other objects by using the digital ...
Frank Siegemund, Muhammad Haroon