Hao

Results: 969



#Item
1Cryptography / Public-key cryptography / Commitment scheme / Secret sharing / Computational hardness assumption / Digital signature / Entropy / XTR

Efficient String-Commitment from Weak Bit-Commitment Kai-Min Chung1, , Feng-Hao Liu2, , Chi-Jen Lu3 , and Bo-Yin Yang3 1 2

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:37
2Computing / Computer programming / Software engineering / Java / Widget toolkits / Cross-platform software / Concurrent computing / Swing / Thread / Debugging / D / Event dispatching thread

Finding Errors in Multithreaded GUI Applications Sai Zhang University of Washington Joint work with: Hao Lu, Michael D. Ernst

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:35
3Cryptography / Post-quantum cryptography / Multivariate cryptography / Finite fields / Lattice-based cryptography / Hidden Field Equations / Learning with errors / QUAD / RSA / Reduction / Computational hardness assumption / Ideal lattice cryptography

Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2012-04-04 23:26:12
4World Wide Web / Digital marketing / Internet search engines / Search engine optimization / Spamming / HTML / Meta element / Google Search / Reserved word / Spamdexing / Baidu / AdWords

How to Learn Klingon Without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy Hao Yang1 , Xiulin Ma1 , Kun Du1 , Zhou Li2 , Haixin Duan1* , Xiaodong Su3 , Guang Liu3 , Zhifeng Gen

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:24
5Software engineering / Computer programming / Computing / Object-oriented programming languages / KeY / Symbolic execution / Thread / LLVM / Parallel computing / D / Concolic testing

Poster: Dynamic Taint Analysis of Concurrent Program Based on Symbolic Execution Yu Hao∗ , Xiaodong Zhang∗ , Zijiang Yang† and Ting Liu∗ ,IEEEauthorrefmark2 ∗ Ministry of Education Key Lab for Intelligent Netw

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-30 18:44:12
6Group theory / Algebra / Abstract algebra / Geometry / N-group / Bluetooth / Subgroup / Formation / Index of a subgroup

GAnGS: Gather, Authenticate ’n Group Securely ∗ Chia-Hsin Owen Chen† , Chung-Wei Chen‡ , Cynthia Kuo§ , Yan-Hao Lai∗ , Jonathan M. McCune§ , Ahren Studer§⋄ , Adrian Perrig§ , Bo-Yin Yang† , Tzong-Chen

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:38
7Software engineering / Computing / Computer programming / Object-oriented programming / Method / High-level programming languages / Functional languages / Programming languages / Inheritance / Method overriding / Factory / Polymorphism

Frequency Estimation of Virtual Call Targets for Object-Oriented Programs Cheng Zhang1 , Hao Xu2, , Sai Zhang3 , Jianjun Zhao1,2 , and Yuting Chen2 1 Department of Computer Science and Engineering, Shanghai Jiao Tong U

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:34
8Business / Economy / Business process / Groupware / Workflow / Business process management / Workflow technology / Scientific workflow system

Automatically Repairing Broken Workflows for Evolving GUI Applications Sai Zhang Hao Lü

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:34
9Computing / Information and communications technology / Data transmission / Computer networking / NetFlow / Network performance / Flow network / Communication protocol / Router / Transmission Control Protocol

CLEF: Limiting the Damage Caused by Large Flows in the Internet Core Hao Wu1,2[0000−0002−5100−1519] , Hsu-Chun Hsiao3[0000−0001−9592−6911] , Daniele E. Asoni4[0000−0001−5699−9237] , 4[0000−0001−9557

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
10Internet architecture / Computing / Network architecture / Internet / Quality of service / Teletraffic / Resource Reservation Protocol / Network protocols / Integrated services / Mobile IP / Handover / RSVP

Evaluation of RSVP and Mobility-aware RSVP Using Performance Evaluation Process Algebra Hao Wang and David I. Laurenson Jane Hillston

Add to Reading List

Source URL: www.dcs.ed.ac.uk

Language: English - Date: 2008-03-05 10:22:30
UPDATE