Sciweavers

526 search results - page 75 / 106
» Towards the Verifying Compiler
Sort
View
ICS
2010
Tsinghua U.
16 years 23 days ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
129
Voted
ECIR
2008
Springer
15 years 4 months ago
Clustering Template Based Web Documents
More and more documents on the World Wide Web are based on templates. On a technical level this causes those documents to have a quite similar source code and DOM tree structure. G...
Thomas Gottron
114
Voted
BMCBI
2010
125views more  BMCBI 2010»
15 years 3 months ago
A computational screen for site selective A-to-I editing detects novel sites in neuron specific Hu proteins
Background: Several bioinformatic approaches have previously been used to find novel sites of ADAR mediated A-to-I RNA editing in human. These studies have discovered thousands of...
Mats Ensterö, Örjan Åkerborg, Dani...
TISSEC
2010
142views more  TISSEC 2010»
14 years 10 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
99
Voted
DAC
2007
ACM
16 years 4 months ago
Chip Multi-Processor Generator
The drive for low-power, high performance computation coupled with the extremely high design costs for ASIC designs, has driven a number of designers to try to create a flexible, ...
Alex Solomatnikov, Amin Firoozshahian, Wajahat Qad...