Sciweavers

1701 search results - page 26 / 341
» Computer Science and State Machines
Sort
View
ACSAC
2001
IEEE
15 years 1 months ago
Information Security: Science, Pseudoscience, and Flying Pigs
The state of the science of information security is astonishingly rich with solutions and tools to incrementally and selectively solve the hard problems. In contrast, the state of...
Roger R. Schell
MFCS
2010
Springer
14 years 8 months ago
Revisiting Ackermann-Hardness for Lossy Counter Machines and Reset Petri Nets
We prove that coverability and termination are not primitive-recursive for lossy counter machines and for Reset Petri nets.
Philippe Schnoebelen
DATE
2002
IEEE
86views Hardware» more  DATE 2002»
15 years 2 months ago
A Layered, Codesign Virtual Machine Approach to Modeling Computer Systems
By using a macro/micro state model we show how assumptions on the resolution of logical and physical timing of computation in computer systems has resulted in design methodologies...
JoAnn M. Paul, Donald E. Thomas
TCC
2004
Springer
147views Cryptology» more  TCC 2004»
15 years 3 months ago
Computational Collapse of Quantum State with Application to Oblivious Transfer
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1−2...
Claude Crépeau, Paul Dumais, Dominic Mayers...