Rocquencourt

Results: 247



#Item
81Escape Analysis. Applications to ML and JavaTM Bruno Blanchet INRIA Rocquencourt  December 2000

Escape Analysis. Applications to ML and JavaTM Bruno Blanchet INRIA Rocquencourt December 2000

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2012-10-01 07:25:52
    82MSFPSimulating Finite Eilenberg Machines with a Reactive Engine Benoˆıt Razet1 INRIA Paris-Rocquencourt

    MSFPSimulating Finite Eilenberg Machines with a Reactive Engine Benoˆıt Razet1 INRIA Paris-Rocquencourt

    Add to Reading List

    Source URL: pauillac.inria.fr

    Language: English - Date: 2008-09-05 08:52:45
      83Ballot secrecy and ballot independence coincide Ben Smyth1 and David Bernhard2 1 INRIA Paris-Rocquencourt, France 2

      Ballot secrecy and ballot independence coincide Ben Smyth1 and David Bernhard2 1 INRIA Paris-Rocquencourt, France 2

      Add to Reading List

      Source URL: www.bensmyth.com

      Language: English - Date: 2013-06-24 12:47:35
        84Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan and Antoine Delignat-Lavaud, INRIA Paris-Rocquencourt; Sergio Maffeis, Imperial College London  This paper is included in the Proceedings of

        Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan and Antoine Delignat-Lavaud, INRIA Paris-Rocquencourt; Sergio Maffeis, Imperial College London This paper is included in the Proceedings of

        Add to Reading List

        Source URL: www.defensivejs.com

        Language: English - Date: 2013-08-15 09:17:30
        85Tactics for Separation Logic early draft Andrew W. Appel INRIA Rocquencourt & Princeton University January 13, 2006

        Tactics for Separation Logic early draft Andrew W. Appel INRIA Rocquencourt & Princeton University January 13, 2006

        Add to Reading List

        Source URL: www.cs.princeton.edu

        Language: English - Date: 2006-11-29 16:23:38
        86Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes Adam McCarthy1 , Ben Smyth1 , and Elizabeth A. Quaglia2 1  INRIA Paris-Rocquencourt, France

        Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes Adam McCarthy1 , Ben Smyth1 , and Elizabeth A. Quaglia2 1 INRIA Paris-Rocquencourt, France

        Add to Reading List

        Source URL: bensmyth.com

        Language: English - Date: 2014-05-14 02:07:07
          87Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes Adam McCarthy1 , Ben Smyth1 , and Elizabeth A. Quaglia2 1  INRIA Paris-Rocquencourt, France

          Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes Adam McCarthy1 , Ben Smyth1 , and Elizabeth A. Quaglia2 1 INRIA Paris-Rocquencourt, France

          Add to Reading List

          Source URL: www.bensmyth.com

          Language: English - Date: 2014-03-31 03:42:07
            88Proved Generation of Implementations from Computationally Secure Protocol Specifications David Cad´e and Bruno Blanchet INRIA Paris-Rocquencourt, France {david.cade,bruno.blanchet}@inria.fr

            Proved Generation of Implementations from Computationally Secure Protocol Specifications David Cad´e and Bruno Blanchet INRIA Paris-Rocquencourt, France {david.cade,bruno.blanchet}@inria.fr

            Add to Reading List

            Source URL: prosecco.gforge.inria.fr

            Language: English - Date: 2012-12-18 10:28:29
              89From the Applied Pi Calculus to Horn Clauses for Protocols with Lists Miriam Paiola and Bruno Blanchet INRIA Paris-Rocquencourt {paiola,blanchet}@inria.fr

              From the Applied Pi Calculus to Horn Clauses for Protocols with Lists Miriam Paiola and Bruno Blanchet INRIA Paris-Rocquencourt {paiola,blanchet}@inria.fr

              Add to Reading List

              Source URL: www2.imm.dtu.dk

              Language: English - Date: 2014-03-13 10:27:35
                90Formal verification of a C-like memory model and its uses for verifying program transformations Xavier Leroy () INRIA Paris-Rocquencourt  Sandrine Blazy ()

                Formal verification of a C-like memory model and its uses for verifying program transformations Xavier Leroy () INRIA Paris-Rocquencourt Sandrine Blazy ()

                Add to Reading List

                Source URL: www.irisa.fr

                Language: English - Date: 2010-05-03 12:09:18