Sciweavers

890 search results - page 81 / 178
» Programming language methods in computer security
Sort
View
SIGOPSE
2000
ACM
14 years 2 months ago
Multiprocessing and portability for PDAs
The role of small devices in the emerging all-connected computer infrastructure is growing. So are the requirements that the application execution environments face. Portability, ...
Grzegorz Czajkowski
ASM
2008
ASM
13 years 12 months ago
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocol...
Nazim Benassa
ICFP
2003
ACM
14 years 10 months ago
Software is discrete mathematics
A three-year study collected information bearing on the question of whether studying mathematics improves programming skills. An analysis of the data revealed significant differen...
Rex L. Page
ASIAN
2006
Springer
104views Algorithms» more  ASIAN 2006»
14 years 1 months ago
Closing Internal Timing Channels by Transformation
Abstract. A major difficulty for tracking information flow in multithreaded programs is due to the internal timing covert channel. Information is leaked via this channel when secre...
Alejandro Russo, John Hughes, David A. Naumann, An...
JELIA
2004
Springer
14 years 3 months ago
Logic Programming Infrastructure for Inferences on FrameNet
Abstract. The growing size of electronically available text corpora like companies’ intranets or the WWW has made information access a hot topic within computational linguistics....
Peter Baumgartner, Aljoscha Burchardt