Sciweavers

3228 search results - page 436 / 646
» Computationally Sound Proofs
Sort
View
231
Voted
VSTTE
2012
Springer
13 years 11 months ago
Infeasible Code Detection
A piece of code in a computer program is infeasible if it cannot be part of any normally-terminating execution of the program. We develop an algorithm for the automatic detection o...
Cristiano Bertolini, Martin Schäf, Pascal Sch...
CVPR
2012
IEEE
13 years 6 months ago
Boosting algorithms for simultaneous feature extraction and selection
The problem of simultaneous feature extraction and selection, for classifier design, is considered. A new framework is proposed, based on boosting algorithms that can either 1) s...
Mohammad J. Saberian, Nuno Vasconcelos
114
Voted
ACL
2012
13 years 6 months ago
Demonstration of IlluMe: Creating Ambient According to Instant Message Logs
We present IlluMe, a software tool pack which creates a personalized ambient using the music and lighting. IlluMe includes an emotion analysis software, the small space ambient li...
Lun-Wei Ku, Cheng-Wei Sun, Ya-Hsin Hsueh
139
Voted
CONCUR
2012
Springer
13 years 6 months ago
Linearizability with Ownership Transfer
Abstract. Linearizability is a commonly accepted notion of correctness for libraries of concurrent algorithms. Unfortunately, it assumes a complete isolation between a library and ...
Alexey Gotsman, Hongseok Yang
131
Voted
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis