Sciweavers

1959 search results - page 84 / 392
» Concerned About Separation
Sort
View
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 4 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
ASUNAM
2009
IEEE
15 years 11 months ago
Networks Evolving Step by Step: Statistical Analysis of Dyadic Event Data
With few exceptions, statistical analysis of social networks is currently focused on cross-sectional or panel data. On the other hand, automated collection of network-data often p...
Ulrik Brandes, Jürgen Lerner, Tom A. B. Snijd...
HICSS
2009
IEEE
105views Biometrics» more  HICSS 2009»
15 years 11 months ago
Social Visualization of Health Messages
Seeking health-related information on the Internet is becoming commonplace. Patients use the Internet to learn about their conditions and medications, and to discuss symptoms and ...
Brant Chee, Karrie G. Karahalios, Bruce Schatz
CC
2004
Springer
127views System Software» more  CC 2004»
15 years 9 months ago
Analyzing Memory Accesses in x86 Executables
This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of the work is to recover intermediate representations that are similar to those that can be c...
Gogul Balakrishnan, Thomas W. Reps
SDMW
2004
Springer
15 years 9 months ago
Secure and Privacy Preserving Outsourcing of Tree Structured Data
With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, ...
Ping Lin, K. Selçuk Candan