Sciweavers

1357 search results - page 76 / 272
» Compositional analysis for linear systems
Sort
View
ICSE
2009
IEEE-ACM
14 years 11 months ago
Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...
EUROCRYPT
2006
Springer
14 years 2 months ago
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts and constant size private keys. More precisely, let N be the total number of users...
Dan Boneh, Amit Sahai, Brent Waters
SPIN
2009
Springer
14 years 4 months ago
Symbolic Analysis via Semantic Reinterpretation
Abstract. The paper presents a novel technique to create implementations of the basic primitives used in symbolic program analysis: forward symbolic evaluation, weakest liberal pre...
Junghee Lim, Akash Lal, Thomas W. Reps
ESOP
2011
Springer
13 years 1 months ago
Typing Local Control and State Using Flow Analysis
Programs written in scripting languages employ idioms that confound conventional type systems. In this paper, we highlight one important set of related idioms: the use of local con...
Arjun Guha, Claudiu Saftoiu, Shriram Krishnamurthi
ICRA
1993
IEEE
112views Robotics» more  ICRA 1993»
14 years 2 months ago
Analysis and Control for Manipulators with Both Joint and Link Flexibility
This work is focused on the analysis of manipulators with both joint and link flexibility. Due to the different order of joint and link stiffness, the full-order nonlinear system ...
Jung-Hua Yang, Li-Chen Fu