Sciweavers

3134 search results - page 198 / 627
» Computing full disjunctions
Sort
View
123
Voted
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
15 years 10 months ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...
VL
2009
IEEE
160views Visual Languages» more  VL 2009»
15 years 10 months ago
Empowering designers with creativity support tools
When conceiving of and implementing interactive behaviors, most designers rely on professional software developers to prototype and implement their designs. They often use static ...
Stephen Oney
IEEEPACT
2009
IEEE
15 years 10 months ago
Mapping Out a Path from Hardware Transactional Memory to Speculative Multithreading
— This research demonstrates that coming support for hardware transactional memory can be leveraged to significantly reduce the cost of implementing true speculative multithread...
Leo Porter, Bumyong Choi, Dean M. Tullsen
128
Voted
WOLLIC
2009
Springer
15 years 10 months ago
Team Logic and Second-Order Logic
Team logic is a new logic, introduced by Väänänen [11], extending dependence logic by classical negation. Dependence logic adds to first-order logic atomic formulas expressing...
Juha Kontinen, Ville Nurmi
133
Voted
FGIT
2009
Springer
15 years 10 months ago
Predicting the Performance of a GRID Environment: An Initial Effort to Increase Scheduling Efficiency
GRID environments are privileged targets for computation-intensive problem solving in areas from weather forecasting to seismic analysis. Mainly composed by commodity hardware, th...
Nuno Guerreiro, Orlando Belo