Sciweavers

239 search results - page 31 / 48
» Proof Techniques for Cryptographic Processes
Sort
View
ISTCS
1992
Springer
15 years 5 months ago
Concurrent Timestamping Made Simple
Concurrent Time-stamp Systems (ctss) allow processes to temporally order concurrent events in an asynchronous shared memorysystem, a powerful tool for concurrency control, serving...
Rainer Gawlick, Nancy A. Lynch, Nir Shavit
99
Voted
ISBI
2008
IEEE
15 years 8 months ago
Theoretical analysis of complex-conjugate-ambiguity suppression in frequency-domain optical-coherence tomography
New phase-shifting techniques have recently been proposed to suppress the complex-conjugate ambiguity in frequencydomain optical-coherence tomography. A phase shift is introduced,...
S. Chandra Sekhar, Roland Michaely, Rainer A. Leit...
CALCO
2007
Springer
100views Mathematics» more  CALCO 2007»
15 years 8 months ago
Applications of Metric Coinduction
Metric coinduction is a form of coinduction that can be used to establish properties of objects constructed as a limit of finite approximations. One can prove a coinduction step s...
Dexter Kozen, Nicholas Ruozzi
SOSP
2003
ACM
15 years 10 months ago
Implementing an untrusted operating system on trusted hardware
Recently, there has been considerable interest in providing “trusted computing platforms” using hardware — TCPA and Palladium being the most publicly visible examples. In th...
David Lie, Chandramohan A. Thekkath, Mark Horowitz
107
Voted
CCGRID
2006
IEEE
15 years 8 months ago
An Overview of Security Issues in Cluster Interconnects
— Widespread use of cluster systems in diverse set of applications has spurred significant interest in providing high performance cluster interconnects. A major inefficiency in...
Manhee Lee, Eun Jung Kim, Ki Hwan Yum, Mazin S. Yo...