Sciweavers

1894 search results - page 319 / 379
» A TLA Proof System
Sort
View
123
Voted
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 10 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
125
Voted
SADFE
2008
IEEE
15 years 10 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
155
Voted
DASFAA
2007
IEEE
134views Database» more  DASFAA 2007»
15 years 10 months ago
Eliciting Matters - Controlling Skyline Sizes by Incremental Integration of User Preferences
Today, result sets of skyline queries are unmanageable due to their exponential growth with the number of query predicates. In this paper we discuss the incremental re-computation ...
Wolf-Tilo Balke, Ulrich Güntzer, Christoph Lo...
ICDCS
2007
IEEE
15 years 10 months ago
Protocol Design for Dynamic Delaunay Triangulation
Delaunay triangulation (DT) is a useful geometric structure for networking applications. In this paper we investigate the design of join, leave, and maintenance protocols to const...
Dong-Young Lee, Simon S. Lam
107
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
Moore: An Extendable Peer-to-Peer Network Based on Incomplete Kautz Digraph with Constant Degree
— The topological properties of peer-to-peer overlay networks are critical factors that dominate the performance of these systems. Several non-constant and constant degree interc...
Deke Guo, Jie Wu, Honghui Chen, Xueshan Luo