Sciweavers

1140 search results - page 37 / 228
» Progress on Certifying Algorithms
Sort
View
ESORICS
2010
Springer
15 years 2 months ago
Flexible Scheduler-Independent Security
Abstract We propose an approach to certify the information flow security of multi-threaded programs independently from the scheduling algorithm. A scheduler-independent verificatio...
Heiko Mantel, Henning Sudbrock
AAECC
2007
Springer
117views Algorithms» more  AAECC 2007»
15 years 2 months ago
A predictor-corrector-type technique for the approximate parameterization of intersection curves
Abstract We describe a method to approximate a segment of the intersection curve of two implicitly defined surfaces by a rational parametric curve. Starting from an initial soluti...
Bert Jüttler, Pavel Chalmovianský
TMA
2012
Springer
268views Management» more  TMA 2012»
13 years 10 months ago
Identifying Skype Nodes in the Network Exploiting Mutual Contacts
Abstract. In this paper we present an algorithm that is able to progressively discover nodes of a Skype overlay P2P network. Most notably, super nodes in the network core. Starting...
Jan Jusko, Martin Rehák
EUROPKI
2007
Springer
15 years 8 months ago
Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code
In this paper we propose the notion of security-by-contract, a mobile contract that an application carries with itself. The key idea of the framework is that a digital signature sh...
Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka...
FPGA
1997
ACM
124views FPGA» more  FPGA 1997»
15 years 6 months ago
A FPGA-Based Implementation of a Fault-Tolerant Neural Architecture for Photon Identification
Event identification in photon counting ICCD detectors requires a high level image analysis which cannot be easily described algorithmically: neural networks are promising to appr...
Monica Alderighi, E. L. Gummati, Vincenzo Piuri, G...