Sciweavers

612 search results - page 80 / 123
» Hardness assumptions in the foundations of theoretical compu...
Sort
View
ACSC
2009
IEEE
14 years 2 months ago
Evaluating the dynamic behaviour of Python applications
The Python programming language is typical among dynamic languages in that programs written in it are not susceptible to static analysis. This makes efficient static program compi...
Alex Holkner, James Harland
ACSC
2006
IEEE
14 years 1 months ago
Throughput fairness in k-ary n-cube networks
The performance of an interconnection network is measured by two metrics: average latency and peak network throughput. Network throughput is the total number of packets delivered ...
Cruz Izu
CCS
2007
ACM
14 years 1 months ago
An inquiry into the nature and causes of the wealth of internet miscreants
This paper studies an active underground economy which specializes in the commoditization of activities such as credit card fraud, identity theft, spamming, phishing, online crede...
Jason Franklin, Adrian Perrig, Vern Paxson, Stefan...
CCA
2005
Springer
14 years 1 months ago
The Dedekind Reals in Abstract Stone Duality
kind Reals in Abstract Stone Duality Andrej Bauer and Paul Taylor 3 June 2009 Stone Duality (ASD) is a direct axiomatisation of general topology, in contrast to the traditional an...
Andrej Bauer, Paul Taylor 0002
POPL
2004
ACM
14 years 8 months ago
Asynchronous and deterministic objects
We present in this article a precise security model for data confidentiality in the framework of asynchronous and deterministic objects. Our underlying programming model is based ...
Denis Caromel, Ludovic Henrio, Bernard P. Serpette