Sciweavers

1471 search results - page 85 / 295
» Composing concurrency control
Sort
View
EUROCRYPT
2001
Springer
15 years 2 months ago
Identification Protocols Secure against Reset Attacks
Abstract. We provide identi£cation protocols that are secure even when the adversary can reset the internal state and/or randomization source of the user identifying itself, and w...
Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Si...
SIGCSE
2008
ACM
92views Education» more  SIGCSE 2008»
14 years 9 months ago
Patterns for programming in parallel, pedagogically
Pipeline, Delta, and Black Hole are three simple patterns used in concurrent software design. We recently presented these and other patterns for parallelism at a nine-hour worksho...
Matthew C. Jadud, Jon Simpson, Christian L. Jacobs...
ANCS
2009
ACM
14 years 7 months ago
A lock-free, cache-efficient shared ring buffer for multi-core architectures
We propose MCRingBuffer, a lock-free, cache-efficient shared ring buffer that provides fast data accesses among threads running in multi-core architectures. MCRingBuffer seeks to ...
Patrick P. C. Lee, Tian Bu, Girish P. Chandranmeno...
POLICY
2009
Springer
15 years 4 months ago
Towards Session-Aware RBAC Administration and Enforcement with XACML
Abstract—An administrative role-based access control (ARBAC) model specifies administrative policies over a role-based access control (RBAC) system, where an administrative perm...
Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan C...
CDC
2009
IEEE
137views Control Systems» more  CDC 2009»
15 years 2 months ago
Generalized Model Predictive Direct Torque Control: Long prediction horizons and minimization of switching losses
Abstract— This paper presents a generalized Model Predictive Direct Torque Control scheme with an extended horizon, which is composed of multiple hinges (groups of switch transit...
Tobias Geyer