Sciweavers

608 search results - page 110 / 122
» Interactive Oracle Proofs
Sort
View
COCO
1997
Springer
127views Algorithms» more  COCO 1997»
14 years 2 months ago
A Nonadaptive NC Checker for Permutation Group Intersection
In this paper we design a nonadaptive NC checker for permutation group intersection, sharpening a result from Blum and Kannan 3]. This is a consequence of two results. First we sh...
Vikraman Arvind, Jacobo Torán
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
14 years 2 months ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly
ESORICS
2006
Springer
14 years 1 months ago
Privacy-Preserving Queries on Encrypted Data
Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, perf...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
CAV
2008
Springer
158views Hardware» more  CAV 2008»
14 years 2 days ago
Linear Arithmetic with Stars
We consider an extension of integer linear arithmetic with a "star" operator takes closure under vector addition of the solution set of a linear arithmetic subformula. We...
Ruzica Piskac, Viktor Kuncak
IESA
2007
13 years 11 months ago
UN/CEFACT Core Components as the basis for structured business communication by SMEs, employing auto-generated, user adjustable
In this paper a methodology is presented to generate webforms for business documents directly from XML schemas. XML Schemas that are based on the UN/CEFACT Naming and Design Rules ...
Fred van Blommestein, Bertjan Broeksema