3,728 research outputs found
PLACES'10: The 3rd Workshop on Programmng Language Approaches to concurrency and Communication-Centric Software
Paphos, Cyprus. March 201
Space-Aware Ambients and Processes
Resource control has attracted increasing interest in foundational research on distributed systems. This paper focuses on space control and develops an analysis of space usage in the context of an ambient-like calculus with bounded capacities and weighed processes, where migration and activation require space. A type system complements the dynamics of the calculus by providing static guarantees that the intended capacity bounds are preserved throughout the computation
Simple Noninterference from Parametricity
In this paper we revisit the connection between parametricity and noninterference. Our primary contribution is a proof of noninterference for a polyvariant variation of the Dependency Core Calculus of in the Calculus of Constructions. The proof is modular: it leverages parametricity for the Calculus of Constructions and the encoding of data abstraction using existential types. This perspective gives rise to simple and understandable proofs of noninterference from parametricity. All our contributions have been mechanised in the Agda proof assistant
Steganography- A Powerful Web Security Tool for Data Transmission
The main objective of this paper titled ďż˝ Steganography ďż˝ A secured tool for web data transmissionďż˝ is to provide security for data files during transmission in the network. The main motto of this type of data security is to prevent data access by unauthorized users during data transmission. The steganography is the process to convert the transmitting data in the network in an unreadable format and it is difficult to understand the stolen person
Advanced Steganography for Hiding Data and Image using Audio-Video
Steganography is an art of hiding the secrete message that is being send in the other non secret text. The benefit of steganography is that the expected mystery message does not pull in thoughtfulness regarding itself as an object of investigation. Our point is to conceal mystery data and picture behind the sound and feature document individually with. Sound records are generally compacted for capacity or speedier transmission. Sound records can be sent in short remain solitary portions. 4LSB is used for video steganography and cryptographic algorithm for encryption and decryption. Parity coding is used for Audio Steganography
The Racket Manifesto
The creation of a programming language calls for guiding principles that point the developers to goals. This article spells out the three basic principles behind the 20-year development of Racket. First, programming is about stating and solving problems, and this activity normally takes place in a context with its own language of discourse; good programmers ought to formulate this language as a programming language. Hence, Racket is a programming language for creating new programming languages. Second, by following this language-oriented approach to programming, systems become multi-lingual collections of interconnected components. Each language and component must be able to protect its specific invariants. In support, Racket offers protection mechanisms to implement a full language spectrum, from C-level bit manipulation to soundly typed extensions. Third, because Racket considers programming as problem solving in the correct language, Racket also turns extra-linguistic mechanisms into linguistic constructs, especially mechanisms for managing resources and projects. The paper explains these principles and how Racket lives up to them, presents the evaluation framework behind the design process, and concludes with a sketch of Racket\u27s imperfections and opportunities for future improvements
Primer: Fast Private Transformer Inference on Encrypted Data
It is increasingly important to enable privacy-preserving inference for cloud
services based on Transformers. Post-quantum cryptographic techniques, e.g.,
fully homomorphic encryption (FHE), and multi-party computation (MPC), are
popular methods to support private Transformer inference. However, existing
works still suffer from prohibitively computational and communicational
overhead. In this work, we present, Primer, to enable a fast and accurate
Transformer over encrypted data for natural language processing tasks. In
particular, Primer is constructed by a hybrid cryptographic protocol optimized
for attention-based Transformer models, as well as techniques including
computation merge and tokens-first ciphertext packing. Comprehensive
experiments on encrypted language modeling show that Primer achieves
state-of-the-art accuracy and reduces the inference latency by 90.6% ~ 97.5%
over previous methods.Comment: 6 pages, 6 figures, 3 table
- âŚ