Sciweavers

80 search results - page 9 / 16
» Program Extraction from Normalization Proofs
Sort
View
RAID
2009
Springer
14 years 2 months ago
Automatically Adapting a Trained Anomaly Detector to Software Patches
Abstract. In order to detect a compromise of a running process based on it deviating from its program’s normal system-call behavior, an anomaly detector must first be trained wi...
Peng Li, Debin Gao, Michael K. Reiter
CL
2000
Springer
13 years 12 months ago
Proving Failure in Functional Logic Programs
How to extract negative information from programs is an important issue in logic programming. Here we address the problem for functional logic programs, from a proof-theoretic pers...
Francisco Javier López-Fraguas, Jaime S&aac...
ICIP
2004
IEEE
14 years 9 months ago
Detection of unique people in news programs using multimodal shot clustering
In this paper we describe an approach that uses a combination of visual and audio features to cluster shots belonging to the same person together in video programs. We use color h...
Alberto Albiol, Cüneyt M. Taskiran, Edward J....
CSL
2005
Springer
14 years 1 months ago
Light Functional Interpretation
We give a Natural Deduction formulation of an adaptation of G¨odel’s functional (Dialectica) interpretation to the extraction of (more) efficient programs from (classical) proof...
Mircea-Dan Hernest
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
13 years 12 months ago
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their interna...
Adi Shamir