Sciweavers

286 search results - page 23 / 58
» Crypto Engineering: Some History and Some Case Studies
Sort
View
ECOOPWEXCEPTION
2006
Springer
13 years 11 months ago
Exception-Handling Bugs in Java and a Language Extension to Avoid Them
It is difficult to write programs that behave correctly in the presence of exceptions. We describe a dataflow analysis for finding a certain class of mistakes made while programs h...
Westley Weimer
CIDR
2009
181views Algorithms» more  CIDR 2009»
13 years 8 months ago
The Case for RodentStore: An Adaptive, Declarative Storage System
Recent excitement in the database community surrounding new applications--analytic, scientific, graph, geospatial, etc.--has led to an explosion in research on database storage sy...
Philippe Cudré-Mauroux, Eugene Wu, Samuel M...
FS
2010
95views more  FS 2010»
13 years 6 months ago
Pricing credit derivatives under incomplete information: a nonlinear-filtering approach
This paper considers a general reduced form pricing model for credit derivatives where default intensities are driven by some factor process X. The process X is not directly observ...
Rüdiger Frey, Wolfgang Runggaldier
RE
2004
Springer
14 years 1 months ago
The Effect of Trust Assumptions on the Elaboration of Security Requirements
Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
RE
2006
Springer
13 years 7 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...