Sciweavers

570 search results - page 99 / 114
» Black-box constructions for secure computation
Sort
View
PLDI
2004
ACM
14 years 1 months ago
Cost effective dynamic program slicing
Although dynamic program slicing was first introduced to aid in user level debugging, applications aimed at improving software quality, reliability, security, and performance hav...
Xiangyu Zhang, Rajiv Gupta
ICLP
2003
Springer
14 years 1 months ago
Flow Java: Declarative Concurrency for Java
Abstract. Logic variables pioneered by (concurrent) logic and concurrent constraint programming are powerful mechanisms for automatically synchronizing concurrent computations. The...
Frej Drejhammar, Christian Schulte, Per Brand, Sei...
DANCE
2002
IEEE
14 years 26 days ago
Active Network Vision and Reality: Lessons from a Capsule-Based System
Although active networks have generated much debate in the research community, on the whole there has been little hard evidence to inform this debate. This paper aims to redress t...
David Wetherall
EDCC
2010
Springer
14 years 21 days ago
Software Process Synthesis in Assurance Based Development of Dependable Systems
—Assurance Based Development (ABD) is a novel approach to the synergistic construction of critical software systems and their assurance arguments. In ABD, the need for assurance ...
Patrick J. Graydon, John C. Knight
GI
2007
Springer
13 years 11 months ago
A Non-Sequential Unsplittable Privacy-Protecting Multi-Coupon Scheme
: A multi-coupon (MC) represents a collection of k coupons that a user can redeem to a vendor in exchange for a benefit (some good or service). Recently, Chen et al. [CEL+ 07] prop...
Alberto N. Escalante, Hans Löhr, Ahmad-Reza S...