Sciweavers

3130 search results - page 170 / 626
» Design Correctness of Digital Systems
Sort
View
215
Voted
PLDI
2003
ACM
15 years 9 months ago
Checking and inferring local non-aliasing
In prior work [15] we studied a language construct restrict that allows programmers to specify that certain pointers are not aliased to other pointers used within a lexical scope....
Alexander Aiken, Jeffrey S. Foster, John Kodumal, ...
CCS
2008
ACM
15 years 6 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
192
Voted
CONEXT
2009
ACM
15 years 5 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
132
Voted
CIE
2010
Springer
15 years 1 months ago
PuzzleTale: A tangible puzzle game for interactive storytelling
We describe the design and development of PuzzleTale, an interactive storytelling system that makes use of tangible puzzle pieces on the surface of an interactive table. In the Pu...
Yang Ting Shen, Ali Mazalek
IFM
2004
Springer
125views Formal Methods» more  IFM 2004»
15 years 9 months ago
Formally Justifying User-Centred Design Rules: A Case Study on Post-completion Errors
Abstract. Interactive systems combine a human operator with a computer. Either may be a source of error. The veri cation processes used must ensure both the correctness of the comp...
Paul Curzon, Ann Blandford