Alex

Results: 7987



#Item
11Model checkers / Software engineering / Computing / Model checking / Theoretical computer science / SPIN model checker / Stack / Promela / Exception handling / Device driver synthesis and verification

Extending Model Checking with Dynamic Analysis Alex Groce and Rajeev Joshi Laboratory for Reliable Software Jet Propulsion Laboratory California Institute of Technology

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:45:03
12Cryptography / Algebra / Abstract algebra / Group theory / Computational hardness assumptions / DiffieHellman key exchange / Cyclic group / Logjam / Generating set of a group / Subgroup / Whitfield Diffie / Computational DiffieHellman assumption

Measuring small subgroup attacks against Diffie-Hellman Luke Valenta∗ , David Adrian† , Antonio Sanso‡ , Shaanan Cohney∗ , Joshua Fried∗ , Marcella Hastings∗ , J. Alex Halderman† , Nadia Heninger∗ ∗ Uni

Add to Reading List

Source URL: www.seas.upenn.edu

Language: English - Date: 2017-09-13 08:39:05
13Computer security / Computing / Computer network security / Security engineering / Information and communications technology / Crime prevention / Cryptography / National security / Virtual private network / SCADA / FBI Criminal Justice Information Services Division / Computer network

A Security Analysis of Police Computer Systems Benjamin VanderSloot∗ Stuart Wheaton∗ J. Alex Halderman

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
14Software testing / Software engineering / Computing / Quality / Fault injection / Software verification / Reliability engineering / Formal verification / Flash memory / Software quality / Stress testing / Exception handling

Randomized Differential Testing as a Prelude to Formal Verification Alex Groce, Gerard Holzmann, and Rajeev Joshi Laboratory for Reliable Software ∗ Jet Propulsion Laboratory California Institute of Technology Pasadena

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:31:43
15Cryptography / Public-key cryptography / Cryptographic protocols / Identity-based cryptography / ID-based encryption / Functional encryption / Garbled circuit / Encryption / Secure multi-party computation / Attribute-based encryption / RSA / Chosen-ciphertext attack

Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions Zvika Brakerski∗ Alex Lombardi†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-10-01 05:36:24
16Formal methods / Theoretical computer science / Software engineering / Computing / Logic in computer science / Software testing / Model checking / Formal verification / Software verification / Flash memory / Verification / Software quality

New Challenges in Model Checking Gerard J. Holzmann, Rajeev Joshi, and Alex Groce NASA/JPL Laboratory for Reliable Software, Pasadena, CA 91109, USA {Gerard.Holzmann, Rajeev.Joshi,Alex.Groce}@jpl.nasa.gov

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:32:09
17Computer network security / Computing / Firewall software / Information and communications technology / Computer security / Data security / Internet censorship in China / Human rights in China / Firewall / Stateful firewall / Internet censorship / Router

Internet Censorship in China: Where Does the Filtering Occur? Xueyang Xu, Z. Morley Mao, and J. Alex Halderman Department of Computer Science and Engineering, University of Michigan, 2260 Hayward Street, Ann Arbor, MI 48

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2011-03-10 12:58:06
18

Hypothetical Outcome Plots Help Untrained Observers Judge Trends in Ambiguous Data Alex Kale, Francis Nguyen, Matthew Kay, and Jessica Hullman Fig. 1. We present two experiments (E1 and E2) evaluating four different unce

Add to Reading List

Source URL: idl.cs.washington.edu

Language: English
    19Statistical natural language processing / World Wide Web / Digital media / Internet culture / Subreddits / Crowdsourcing / Reddit / Collaboration / /r/IAmA / Oriented FAST and rotated BRIEF / Topic model / Select

    Learning Linguistic Descriptors of User Roles in Online Communities Alex Wang1 , William L. Hamilton2 , Jure Leskovec2 1 School of Engineering and Applied Sciences, Harvard University, Cambridge MA, Computer Scie

    Add to Reading List

    Source URL: www.aclweb.org

    Language: English - Date: 2016-10-27 12:19:11
    20Cryptocurrencies / Bitcoin / Concurrent computing / Computing / Computer network security / Multi-agent systems / Spamming / Cybercrime / Botnet / Mining pool / ZeroAccess botnet / Satoshi Nakamoto

    Botcoin: Monetizing Stolen Cycles Danny Yuxing Huang, Hitesh Dharmdasani† , Sarah Meiklejohn Vacha Dave, Chris Grier∗ , Damon McCoy† , Stefan Savage, Nicholas Weaver∗ Alex C. Snoeren and Kirill Levchenko UC San D

    Add to Reading List

    Source URL: smeiklej.com

    Language: English - Date: 2018-10-23 14:58:02
    UPDATE