Sciweavers

890 search results - page 25 / 178
» Programming language methods in computer security
Sort
View
ACL2
2006
ACM
14 years 1 months ago
An embedding of the ACL2 logic in HOL
We describe an embedding of the ACL2 logic into higherorder logic. An implementation of this embedding allows ACL2 to be used as an oracle for higher-order logic provers. Categori...
Michael J. C. Gordon, Warren A. Hunt Jr., Matt Kau...
FLAIRS
2006
13 years 8 months ago
Computer-Aided Language Processing
The invited talk will introduce Computer-Aided Language Processing (CALP) as an emerging area of practical interest and significance and will present experiments of several CALP a...
Ruslan Mitkov
ICALP
2005
Springer
14 years 28 days ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
APLAS
2011
ACM
12 years 7 months ago
Decentralized Delimited Release
Abstract. Decentralization is a major challenge for secure computing. In a decentralized setting, principals are free to distrust each other. The key challenge is to provide suppor...
Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld

Book
425views
15 years 5 months ago
Programming Languages: Application and Interpretation
"The book is the textbook for the programming languages course at Brown University, which is taken primarily by third and fourth year undergraduates and beginning graduate (bo...
Shriram Krishnamurthi