Sciweavers

3155 search results - page 228 / 631
» How Are You Doing
Sort
View
SP
2009
IEEE
122views Security Privacy» more  SP 2009»
14 years 4 months ago
Plaintext Recovery Attacks against SSH
This paper presents a variety of plaintext-recovering attacks against SSH. We implemented a proof of concept of our attacks against OpenSSH, where we can verifiably recover 14 bi...
Martin R. Albrecht, Kenneth G. Paterson, Gaven J. ...
VL
2009
IEEE
160views Visual Languages» more  VL 2009»
14 years 4 months ago
Empowering designers with creativity support tools
When conceiving of and implementing interactive behaviors, most designers rely on professional software developers to prototype and implement their designs. They often use static ...
Stephen Oney
CIE
2009
Springer
14 years 4 months ago
Computable Exchangeable Sequences Have Computable de Finetti Measures
Abstract. We prove a uniformly computable version of de Finetti’s theorem on exchangeable sequences of real random variables. In the process, we develop machinery for computably ...
Cameron E. Freer, Daniel M. Roy
EPIA
2009
Springer
14 years 4 months ago
A Logic Programming System for Evolving Programs with Temporal Operators
Logic Programming Update Languages were proposed as an extension of logic programming that allows modeling the dynamics of knowledge bases where both extensional (facts) and intent...
José Júlio Alferes, Alfredo Gabaldon...
ESAW
2009
Springer
14 years 4 months ago
Programming Organization-Aware Agents
Organizational notions such as roles, norms (e.g., obligations and permissions), and services are increasingly viewed as natural concepts to manage the complexity of software devel...
M. Birna van Riemsdijk, Koen V. Hindriks, Catholij...