Sciweavers

1833 search results - page 22 / 367
» Mechanized Verification with Sharing
Sort
View
CC
2008
Springer
111views System Software» more  CC 2008»
14 years 28 days ago
Java Bytecode Verification for @NonNull Types
Java's annotation mechanism allows us to extend its type system with non-null types. However, checking such types cannot be done using the existing bytecode verification algor...
Chris Male, David J. Pearce, Alex Potanin, Constan...
ICC
2009
IEEE
129views Communications» more  ICC 2009»
14 years 5 months ago
Random Access Protocols for WLANs Based on Mechanism Design
— In wireless local area networks (WLANs), quality of service (QoS) can be provided by mapping applications with different requirements (e.g., delay and throughput) into one of t...
Man Hon Cheung, Amir Hamed Mohsenian Rad, Vincent ...
CCS
2006
ACM
14 years 2 months ago
Bridging the gap between web application firewalls and web applications
Web applications are the Achilles heel of our current ICT infrastructure. NIST's national vulnerability database clearly shows that the percentage of vulnerabilities located ...
Lieven Desmet, Frank Piessens, Wouter Joosen, Pier...
CSI
2007
54views more  CSI 2007»
13 years 11 months ago
A practical verifiable multi-secret sharing scheme
C.-C. Yang, T.-Y. Chang, M.-S. Hwang [C.-C. Yang, T.-Y. Chang, M.-S. Hwang, A (t,n) multi-secret sharing scheme, Applied Mathematics and Computation 151 (2004) 483–490] proposed...
Jian-jie Zhao, Jianzhong Zhang 0005, Rong Zhao
HICSS
2000
IEEE
134views Biometrics» more  HICSS 2000»
14 years 3 months ago
Peer-to-Peer Valuation as a Mechanism for Reinforcing Active Learning in Virtual Communities: Actualizing Social Exchange Theory
As knowledge becomes the primary focus of work in many industries, virtual communities and groups are emerging as part of new organizational forms. Within these virtual forms, eff...
Amrit Tiwana, Ashley A. Bush