Sciweavers

1448 search results - page 26 / 290
» Restricted Stack Implementations
Sort
View
FPL
2004
Springer
75views Hardware» more  FPL 2004»
15 years 7 months ago
Multiple Restricted Multiplication
Abstract. This paper focuses on a class of problem relating to the multiplication of a single number by several coefficients that, while not constant, are drawn from a finite set ...
Nalin Sidahao, George A. Constantinides, Peter Y. ...
TCC
2004
Springer
100views Cryptology» more  TCC 2004»
15 years 7 months ago
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes
In earlier work, we described a “pathological” example of a signature scheme that is secure in the Random Oracle Model, but for which no secure implementation exists. For that...
Ran Canetti, Oded Goldreich, Shai Halevi
AINA
2004
IEEE
15 years 5 months ago
A Personal Tourism Navigation System to Support Traveling Multiple Destinations with Time Restrictions
In this paper, we propose a personal navigation system (called PNS) which navigates a tourist through multiple destinations efficiently. In our PNS, a tourist can specify multiple...
Atsushi Maruyama, Naoki Shibata, Yoshihiro Murata,...
DICS
2006
15 years 3 months ago
Advances in the Design and Implementation of Group Communication Middleware
Abstract. Group communication is a programming abstraction that allows a distributed group of processes to provide a reliable service in spite of the possibility of failures within...
Daniel C. Bünzli, Rachele Fuzzati, Sergio Men...
WDAG
2005
Springer
85views Algorithms» more  WDAG 2005»
15 years 7 months ago
Time and Space Lower Bounds for Implementations Using k-CAS
This paper presents lower bounds on the time- and space-complexity of implementations that use the k compare-and-swap (k-CAS) synchronization primitives. We prove that the use of ...
Hagit Attiya, Danny Hendler