Sciweavers

142 search results - page 7 / 29
» On the Construction of (Explicit) Khodak's Code and Its Anal...
Sort
View
NDSS
2003
IEEE
14 years 22 days ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
COCO
2011
Springer
217views Algorithms» more  COCO 2011»
12 years 7 months ago
Noisy Interpolation of Sparse Polynomials, and Applications
Let f ∈ Fq[x] be a polynomial of degree d ≤ q/2. It is well-known that f can be uniquely recovered from its values at some 2d points even after some small fraction of the valu...
Shubhangi Saraf, Sergey Yekhanin
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 7 months ago
Multigroup-Decodable STBCs from Clifford Algebras
A Space-Time Block Code (STBC) in K symbols (variables) is called g-group decodable STBC if its maximumlikelihood decoding metric can be written as a sum of g terms such that each ...
Sanjay Karmakar, B. Sundar Rajan
COMPSAC
2010
IEEE
13 years 4 months ago
Security in Context: Analysis and Refinement of Software Architectures
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
JOT
2007
95views more  JOT 2007»
13 years 7 months ago
The Infer Type Refactoring and its Use for Interface-Based Programming
Interface-based programming, i.e. the systematic use of interface types in variable declarations, serves the decoupling of classes and increases a program’s changeability. To ma...
Friedrich Steimann