Sciweavers

8499 search results - page 34 / 1700
» cans 2009
Sort
View
EUROCRYPT
2009
Springer
14 years 11 months ago
Breaking RSA Generically Is Equivalent to Factoring
We show that a generic ring algorithm for breaking RSA in ZN can be converted into an algorithm for factoring the corresponding RSA-modulus N. Our results imply that any attempt at...
Divesh Aggarwal, Ueli M. Maurer
SAS
2009
Springer
175views Formal Methods» more  SAS 2009»
14 years 11 months ago
Automatic Parallelization and Optimization of Programs by Proof Rewriting
We show how, given a program and its separation logic proof, one can parallelize and optimize this program and transform its proof simultaneously to obtain a proven parallelized an...
Clément Hurlin
CAV
2009
Springer
153views Hardware» more  CAV 2009»
14 years 11 months ago
Browser-Based Enforcement of Interface Contracts in Web Applications with BeepBeep
Abstract. BeepBeep is a lightweight runtime monitor for Ajax web applications. Interface specifications are expressed internally in an extension of LTL with first-order quantificat...
Sylvain Hallé, Roger Villemaire
PERCOM
2009
ACM
14 years 11 months ago
Human Tracking Using Electric Fields
In this paper we describe a simple, cheap, and unobtrusive demo system that can track multiple persons with low-frequency electric fields. The system's operation is based on m...
Miika Valtonen, Jukka Vanhala
ACSD
2009
IEEE
117views Hardware» more  ACSD 2009»
14 years 5 months ago
Petrifying Operating Guidelines for Services
Abstract. Operating guidelines characterize correct interaction (e.g. deadlock freedom) with a service. They can be stored in a service registry. So far, they have been represented...
Niels Lohmann, Karsten Wolf