Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Tobias Pfeffer"'
Autor:
Tobias Pfeffer, Lode Pollet
Publikováno v:
New Journal of Physics, Vol 19, Iss 4, p 043005 (2017)
We present the construction and stochastic summation of rooted-tree diagrams, based on the expansion of a root finding algorithm applied to the Dyson–Schwinger equations. The mathematical formulation shows superior convergence properties compared t
Externí odkaz:
https://doaj.org/article/7cad55ad4dd54555a60c244221a438b4
Autor:
Mattia Arrigo, Feriel Azibani, Johann Bauersachs, Olivia Briton, Matthew Cauldwell, Ashley Chin, P. van der Meer, Hasan Ali Farhan, Sorel Goland, Julia Hähnle, Lina Hähnle, Denise Hilfiker-Kleiner, Julian Hoevelmann, A.M. Jackson, Mark Johnson, Kamilu Musa Karaye, Tobias König, Alexandre Mebazaa, Rob Scott Millar, Valeska Abou Moulig, Frederic Mouquet, M.C. Petrie, Mark Petrie, Tobias Pfeffer, Karen Sliwa, K. Tibazarwa, Charle Viljoen, Israa Fadhil Yaseen
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d907f04c37e4b6c4c087b7a09613c9c5
https://doi.org/10.1016/b978-0-12-817667-2.09992-8
https://doi.org/10.1016/b978-0-12-817667-2.09992-8
Autor:
Tobias Pfeffer, Sabine Glesner
Publikováno v:
CCSW@CCS
Secure Multi-Execution (SME) is a promising solution for precise automatic information flow control that can be used to transform potentially vulnerable programs into secure variants. However, due to the multi-execution, it comes with high resource d
Publikováno v:
QRS
Enforcement of hypersafety security policies such as noninterference can be achieved through Secure Multi-Execution (SME). While this is typically very resource-intensive, more efficient solutions such as Demand-Driven Secure Multi-Execution (DDSME)
Publikováno v:
WETICE
The increasing use of closed-source software in everyday life leads to a need for privacy verification of binary code. Unfortunately, analyses of machine code behavior are often imprecise, do not scale, or require expert interaction. We present a nov
Publikováno v:
CODASPY
Dynamic Information Flow Control (IFC) systems, like No-Sensitive-Upgrade or Permissive-Upgrade, can guarantee Termination-Insensitive Non-Interference, but reject valid programs due to their inability to track implicit flows. More advanced multi-exe
Dieses Buch bietet einen praxisnahen Leitfaden zum Thema Immobilien-Fondsmanagement und -Investment. Mehr als 40 Branchenexperten geben Auskunft über das Instrumentarium des Investments und Managements von indirekten Immobilienanlagen. So werden di
Publikováno v:
Physical Review B
We study the finite-temperature superfluid transition in a modified two-dimensional (2D) XY model with power-law distributed "scratch"-like bond disorder. As its exponent decreases, the disorder grows stronger and the mechanism driving the superfluid
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7f1a181960b05ca40219a345a8408047
http://arxiv.org/abs/1807.09184
http://arxiv.org/abs/1807.09184
Publikováno v:
WETICE
Approaches for the automatic analysis of security policies on source code level cannot trivially be applied to binaries. This is due to the lacking high-level semantics of low-level object code, and the fundamental problem that control-flow recovery