Sciweavers

1042 search results - page 81 / 209
» Can Aspects Implement Contracts
Sort
View
OSDI
1996
ACM
13 years 11 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
NOMS
2010
IEEE
201views Communications» more  NOMS 2010»
13 years 8 months ago
Checkpoint-based fault-tolerant infrastructure for virtualized service providers
Crash and omission failures are common in service providers: a disk can break down or a link can fail anytime. In addition, the probability of a node failure increases with the num...
Iñigo Goiri, Ferran Julià, Jordi Gui...
EUROCRYPT
2012
Springer
12 years 12 days ago
Fully Homomorphic Encryption with Polylog Overhead
We show that homomorphic evaluation of (wide enough) arithmetic circuits can be accomplished with only polylogarithmic overhead. Namely, we present a construction of fully homomorp...
Craig Gentry, Shai Halevi, Nigel P. Smart
CSMR
2009
IEEE
14 years 2 months ago
A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis
Creating accurate models of information systems is an important but challenging task. It is generally well understood that such modeling encompasses general scientific issues, bu...
Ulrik Franke, Pontus Johnson, Robert Lagerströ...
COMPGEOM
2003
ACM
14 years 3 months ago
The smallest enclosing ball of balls: combinatorial structure and algorithms
We develop algorithms for computing the smallest enclosing ball of a set of n balls in d-dimensional space. Unlike previous methods, we explicitly address small cases (n ≤ d + 1...
Kaspar Fischer, Bernd Gärtner