Sciweavers

2421 search results - page 99 / 485
» Message from the Co-Chairs
Sort
View
FMCO
2006
Springer
135views Formal Methods» more  FMCO 2006»
13 years 11 months ago
Links: Web Programming Without Tiers
Links is a programming language for web applications that generates code for all three tiers of a web application from a single source, compiling into JavaScript to run on the clie...
Ezra Cooper, Sam Lindley, Philip Wadler, Jeremy Ya...
FSE
2006
Springer
109views Cryptology» more  FSE 2006»
13 years 11 months ago
Cryptanalysis of the Stream Cipher DECIM
DECIM is a hardware oriented stream cipher with an 80-bit key and a 64-bit IV. In this paper, we point out two serious flaws in DECIM. One flaw is in the initialization of DECIM. I...
Hongjun Wu, Bart Preneel
NSDI
2008
13 years 10 months ago
Exploiting Machine Learning to Subvert Your Spam Filter
Using statistical machine learning for making security decisions introduces new vulnerabilities in large scale systems. This paper shows how an adversary can exploit statistical m...
Blaine Nelson, Marco Barreno, Fuching Jack Chi, An...
FSE
2008
Springer
141views Cryptology» more  FSE 2008»
13 years 9 months ago
Collisions for Step-Reduced SHA-256
In this article we find collisions for step-reduced SHA-256. We develop a differential that holds with high probability if the message satisfies certain conditions. We solve the eq...
Ivica Nikolic, Alex Biryukov
HCI
2007
13 years 9 months ago
Aspects of Augmented Social Cognition: Social Information Foraging and Social Search
In this paper, we summarized recent work in modeling how users socially forage and search for information. One way to bridge between different communities of users is to diversify ...
Ed Huai-hsin Chi, Peter Pirolli, Shyong K. Lam