Sciweavers

526 search results - page 75 / 106
» Towards the Verifying Compiler
Sort
View
ICS
2010
Tsinghua U.
14 years 7 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
ECIR
2008
Springer
13 years 11 months ago
Clustering Template Based Web Documents
More and more documents on the World Wide Web are based on templates. On a technical level this causes those documents to have a quite similar source code and DOM tree structure. G...
Thomas Gottron
BMCBI
2010
125views more  BMCBI 2010»
13 years 9 months ago
A computational screen for site selective A-to-I editing detects novel sites in neuron specific Hu proteins
Background: Several bioinformatic approaches have previously been used to find novel sites of ADAR mediated A-to-I RNA editing in human. These studies have discovered thousands of...
Mats Ensterö, Örjan Åkerborg, Dani...
TISSEC
2010
142views more  TISSEC 2010»
13 years 4 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
DAC
2007
ACM
14 years 10 months ago
Chip Multi-Processor Generator
The drive for low-power, high performance computation coupled with the extremely high design costs for ASIC designs, has driven a number of designers to try to create a flexible, ...
Alex Solomatnikov, Amin Firoozshahian, Wajahat Qad...