Sciweavers

8499 search results - page 34 / 1700
» cans 2009
Sort
View
83
Voted
EUROCRYPT
2009
Springer
16 years 1 months ago
Breaking RSA Generically Is Equivalent to Factoring
We show that a generic ring algorithm for breaking RSA in ZN can be converted into an algorithm for factoring the corresponding RSA-modulus N. Our results imply that any attempt at...
Divesh Aggarwal, Ueli M. Maurer
SAS
2009
Springer
175views Formal Methods» more  SAS 2009»
16 years 1 months ago
Automatic Parallelization and Optimization of Programs by Proof Rewriting
We show how, given a program and its separation logic proof, one can parallelize and optimize this program and transform its proof simultaneously to obtain a proven parallelized an...
Clément Hurlin
110
Voted
CAV
2009
Springer
153views Hardware» more  CAV 2009»
16 years 1 months ago
Browser-Based Enforcement of Interface Contracts in Web Applications with BeepBeep
Abstract. BeepBeep is a lightweight runtime monitor for Ajax web applications. Interface specifications are expressed internally in an extension of LTL with first-order quantificat...
Sylvain Hallé, Roger Villemaire
PERCOM
2009
ACM
16 years 1 months ago
Human Tracking Using Electric Fields
In this paper we describe a simple, cheap, and unobtrusive demo system that can track multiple persons with low-frequency electric fields. The system's operation is based on m...
Miika Valtonen, Jukka Vanhala
90
Voted
ACSD
2009
IEEE
117views Hardware» more  ACSD 2009»
15 years 7 months ago
Petrifying Operating Guidelines for Services
Abstract. Operating guidelines characterize correct interaction (e.g. deadlock freedom) with a service. They can be stored in a service registry. So far, they have been represented...
Niels Lohmann, Karsten Wolf