Sciweavers

434 search results - page 23 / 87
» The Case for Browser Provenance
Sort
View
CCS
2011
ACM
12 years 8 months ago
Fortifying web-based applications automatically
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...
Shuo Tang, Nathan Dautenhahn, Samuel T. King
APPROX
2009
Springer
107views Algorithms» more  APPROX 2009»
14 years 3 months ago
Hierarchy Theorems for Property Testing
Referring to the query complexity of property testing, we prove the existence of a rich hierarchy of corresponding complexity classes. That is, for any relevant function q, we prov...
Oded Goldreich, Michael Krivelevich, Ilan Newman, ...
IWFM
1998
13 years 10 months ago
Formal Engineering of the Bitonic Sort using PVS
In this paper, we present a proof that the bitonic sort is sound using PVS, a powerful specification and verification environment. First, we briefly introduce this well-known para...
Raphaël Couturier
JSCIC
2010
145views more  JSCIC 2010»
13 years 3 months ago
Interior Penalty Continuous and Discontinuous Finite Element Approximations of Hyperbolic Equations
In this paper we present the continuous and discontinuous Galerkin methods in a unified setting for the numerical approximation of the transport dominated advection-reaction equati...
Erik Burman, Alfio Quarteroni, Benjamin Stamm
TGC
2007
Springer
14 years 2 months ago
Type-Safe Distributed Programming with ML5
Abstract We present ML5, a high level programming language for spatially distributed computing. The language, a variant of ML, allows an entire distributed application to be develo...
Tom Murphy VII, Karl Crary, Robert Harper