Sciweavers

1448 search results - page 19 / 290
» From Requirements to Code Revisited
Sort
View
CCS
2009
ACM
14 years 8 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen
SCAM
2008
IEEE
14 years 2 months ago
CoordInspector: A Tool for Extracting Coordination Data from Legacy Code
—More and more current software systems rely on non trivial coordination logic for combining autonomous services typically running on different platforms and often owned by diffe...
Nuno F. Rodrigues, Luís Soares Barbosa
EUROCRYPT
2007
Springer
14 years 1 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
CLEIEJ
2002
192views more  CLEIEJ 2002»
13 years 7 months ago
Automatic ObjectPascal Code Generation from Catalysis Specifications
This paper presents a Component-based Framework Development Process, of the Cardiology Domain. The Framework, called FrameCardio, was developed in 4 steps: 1Problem Domain Definit...
João Luís Cardoso de Moraes, Ant&oci...
ALIFE
2005
13 years 7 months ago
Material Representations: From the Genetic Code to the Evolution of Cellular Automata
We present a new definition of the concept of representation for cognitive science that is based on a study of the origin of structures that are used to store memory in evolving sy...
Luis Mateus Rocha, Wim Hordijk