Sciweavers

890 search results - page 113 / 178
» Programming language methods in computer security
Sort
View
ICALP
2005
Springer
14 years 3 months ago
Single-Database Private Information Retrieval with Constant Communication Rate
We present a single-database private information retrieval (PIR) scheme with communication complexity O(k+d), where k ≥ log n is a security parameter that depends on the database...
Craig Gentry, Zulfikar Ramzan
CONCURRENCY
1998
181views more  CONCURRENCY 1998»
13 years 9 months ago
Communication Performance of Java-Based Parallel Virtual Machines
Message passing libraries such as Parallel Virtual Machine PVM and Message Passing Interface MPI provide a common Application Programming Interface API to implement parallel...
Narendar Yalamanchilli, William W. Cohen
ACL2
2006
ACM
14 years 1 months ago
Quantification in tail-recursive function definitions
We investigate the logical issues behind axiomatizing equations that contain both recursive calls and quantifiers in ACL2. We identify a class of such equations, named extended ta...
Sandip Ray
ASPLOS
2006
ACM
14 years 3 months ago
Bell: bit-encoding online memory leak detection
Memory leaks compromise availability and security by crippling performance and crashing programs. Leaks are difficult to diagnose because they have no immediate symptoms. Online ...
Michael D. Bond, Kathryn S. McKinley
PDP
2008
IEEE
14 years 4 months ago
A Transformation Framework for Communicating Multiprocessor-Tasks
Parallel programming models based on a mixture of task and data parallelism have shown to be successful in addressing the increasing communication overhead of distributed memory p...
Jörg Dümmler, Thomas Rauber, Gudula R&uu...