Sciweavers

380 search results - page 22 / 76
» Functional reactive programming from first principles
Sort
View
FSE
2008
Springer
177views Cryptology» more  FSE 2008»
13 years 11 months ago
MD4 is Not One-Way
MD4 is a hash function introduced by Rivest in 1990. It is still used in some contexts, and the most commonly used hash function (MD5, SHA-1, SHA-2) are based on the design princip...
Gaëtan Leurent
EUROCRYPT
2006
Springer
14 years 1 months ago
Private Circuits II: Keeping Secrets in Tamperable Circuits
Abstract. Motivated by the problem of protecting cryptographic hardware, we continue the investigation of private circuits initiated in [16]. In this work, our aim is to construct ...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David ...
MICCAI
1999
Springer
14 years 1 months ago
Analysis of Functional MRI Data Using Mutual Information
Abstract. A new information-theoretic approach is presented for analyzing fMRI data to calculate the brain activation map. The method is based on a formulation of the mutualinforma...
Andy Tsai, John W. Fisher III, Cindy Wible, Willia...
AAAI
2010
13 years 11 months ago
Automated Program Debugging Via Multiple Predicate Switching
In a previous paper, Liu argued for the importance of establishing a precise theoretical foundation for program debugging from first principles. In this paper, we present a first ...
Yongmei Liu, Bing Li
ICST
2009
IEEE
14 years 4 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry