Sciweavers

458 search results - page 56 / 92
» Designing and executing protocols using the event calculus
Sort
View
INFOCOM
1997
IEEE
14 years 1 months ago
An Algorithm to Compute Collusion Paths
In earlier work we have formulated a collusion problem that determines whether it is possible for a set of colluders to collectively discover a target set of information, starting...
Steven H. Low, Nicholas F. Maxemchuk
OOPSLA
2007
Springer
14 years 3 months ago
Scalable omniscient debugging
Omniscient debuggers make it possible to navigate backwards in time within a program execution trace, drastically improving the task of debugging complex applications. Still, they...
Guillaume Pothier, Éric Tanter, José...
AIME
2003
Springer
14 years 2 months ago
Linking Clinical Guidelines with Formal Representations
Abstract. Clinical protocols and guidelines have been used in the medical domain for some time now, primarily to reduce proneness to errors during the treatment of specific disease...
Peter Votruba, Silvia Miksch, Robert Kosara
OOPSLA
2005
Springer
14 years 2 months ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....
ASIACRYPT
2009
Springer
14 years 3 months ago
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
Abstract. We describe a public-key encryption scheme based on lattices — specifically, based on the hardness of the learning with error (LWE) problem — that is secure against ...
Jonathan Katz, Vinod Vaikuntanathan