Sciweavers

13271 search results - page 146 / 2655
» Computers, Programming, and People
Sort
View
CCS
2011
ACM
14 years 4 months ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum
ICLP
2003
Springer
15 years 9 months ago
Computing Minimal Models, Stable Models, and Answer Sets
We propose and study algorithms for computing minimal models, stable models and answer sets of 2- and 3-CNF theories, and normal and disjunctive 2- and 3-programs. We are especiall...
Zbigniew Lonc, Miroslaw Truszczynski
127
Voted
ISW
2007
Springer
15 years 10 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...
IFIP
2000
Springer
15 years 7 months ago
Network-Based Scientific Computing
Elias N. Houstis, Ann Christine Catlin, Ganesh Bal...
OOPSLA
2010
Springer
15 years 2 months ago
Programming with time: cyber-physical programming with impromptu
The act of computer programming is generally considered to be temporally removed from a computer program’s execution. In this paper we discuss the idea of programming as an acti...
Andrew Sorensen, Henry Gardner