Sciweavers

1729 search results - page 207 / 346
» Deterministic Expressions in C
Sort
View
SP
1998
IEEE
162views Security Privacy» more  SP 1998»
14 years 2 months ago
Complete, Safe Information Flow with Decentralized Labels
The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Andrew C. Myers, Barbara Liskov
CCS
1998
ACM
14 years 2 months ago
A Probabilistic Poly-Time Framework for Protocol Analysis
We develop a framework for analyzing security protocols in which protocol adversaries may be arbitrary probabilistic polynomial-time processes. In this framework, protocols are wr...
Patrick Lincoln, John C. Mitchell, Mark Mitchell, ...
SIGMOD
1998
ACM
233views Database» more  SIGMOD 1998»
14 years 2 months ago
Automatic Subspace Clustering of High Dimensional Data for Data Mining Applications
Data mining applications place special requirements on clustering algorithms including: the ability to nd clusters embedded in subspaces of high dimensional data, scalability, end...
Rakesh Agrawal, Johannes Gehrke, Dimitrios Gunopul...
INFOCOM
1997
IEEE
14 years 2 months ago
Performance of Multicasting Closed Interconnection Networks
This paper examines the application of a simple yet general packet replication scheme to achieve multicasting in closed interconnection networks. The performance of these networks...
Cathy W. Chan, Soung C. Liew
ELPUB
1997
ACM
14 years 2 months ago
Generic Hypermedia Structure and Presentation Specification
We consider the generic hypermedia structure of a document to be a means of representing the document that allows it to be processed into a wide variety of presentations. Represen...
Lloyd Rutledge, Jacco van Ossenbruggen, Lynda Hard...