Sciweavers

11063 search results - page 53 / 2213
» On the existence of universal models
Sort
View
W4A
2006
ACM
14 years 1 months ago
Mobile phones may be the right devices for supporting developing world accessibility, but is the WWW the right service delivery
In this paper we detail the synergies we have observed between the features and limitations of mobile phones, and the usability and accessibility requirements of rural developing ...
Tapan S. Parikh
ICCAD
1996
IEEE
86views Hardware» more  ICCAD 1996»
13 years 12 months ago
Tearing based automatic abstraction for CTL model checking
Based Automatic Abstraction for CTL Model Checking Woohyuk Lee Abelardo Pardo Jae-Young Jang Gary Hachtel Fabio Somenzi University of Colorado ECEN Campus Box 425 Boulder, CO, 8030...
Woohyuk Lee, Abelardo Pardo, Jae-Young Jang, Gary ...
KBSE
2007
IEEE
14 years 2 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
COMPUTER
1998
94views more  COMPUTER 1998»
13 years 7 months ago
Multiprocessors Should Support Simple Memory-Consistency Models
provide tools or abstractions that allow developers to program in parallel. But what hardware do we need to support shared memory threads? The hardware should provide a well-defin...
Mark D. Hill
FOCS
2010
IEEE
13 years 5 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass