Sciweavers

182 search results - page 21 / 37
» The Secret Art of Computer Programming
Sort
View
ICALP
2011
Springer
12 years 10 months ago
Probabilistic Bisimulation and Simulation Algorithms by Abstract Interpretation
act Interpretation SILVIA CRAFA FRANCESCO RANZATO University of Padova, Italy We show how bisimulation equivalence and simulation preorder on probabilistic LTSs (PLTSs), namely the...
Silvia Crafa, Francesco Ranzato
MHCI
2009
Springer
14 years 1 months ago
Mobile implementation of a web 3D carousel with touch input
Mobile devices such as the iPhone provide state of the art interaction capabilities also for web browser applications. Our mobile development is targeted to a Energy Awareness app...
Christoffer Björkskog, Giulio Jacucci, Bruno ...
ARTS
1997
Springer
13 years 10 months ago
The Verus Language: Representing Time Efficiently with BDDs
There have been significant advances on formal methods to verify complex systems recently. Nevertheless, these methods have not yet been accepted as a realistic alternative to the ...
Sérgio Vale Aguiar Campos, Edmund M. Clarke
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
11 years 9 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
ICALP
2001
Springer
13 years 11 months ago
Secure Games with Polynomial Expressions
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
Aggelos Kiayias, Moti Yung