Sciweavers

5639 search results - page 736 / 1128
» Timed Abstract Non-interference
Sort
View
CAV
2009
Springer
116views Hardware» more  CAV 2009»
16 years 5 months ago
Meta-analysis for Atomicity Violations under Nested Locking
Abstract. We study the problem of determining, given a run of a concurrent program, whether there is any alternate execution of it that violates atomicity, where atomicity is defin...
Azadeh Farzan, P. Madhusudan, Francesco Sorrentino
CHES
2009
Springer
162views Cryptology» more  CHES 2009»
16 years 5 months ago
Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers
Abstract. This paper is devoted to the design of fast parallel accelerators for the cryptographic Tate pairing in characteristic three over supersingular elliptic curves. We propos...
Jean-Luc Beuchat, Jérémie Detrey, Ni...
PERCOM
2009
ACM
16 years 5 months ago
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods
Abstract--"Secure Device Pairing" is the process of bootstrapping a secure channel between two previously unassociated devices over a (usually wireless) human-imperceptib...
Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun
EWSN
2009
Springer
16 years 5 months ago
Sundial: Using Sunlight to Reconstruct Global Timestamps
Abstract. This paper investigates postmortem timestamp reconstruction in environmental monitoring networks. In the absence of a timesynchronization protocol, these networks use mul...
Jayant Gupchup, Razvan Musaloiu-Elefteri, Alexande...
KDD
2004
ACM
150views Data Mining» more  KDD 2004»
16 years 5 months ago
Complete This Puzzle: A Connectionist Approach to Accurate Web Recommendations Based on a Committee of Predictors
Abstract. We present a Context Ultra-Sensitive Approach based on two-step Recommender systems (CUSA-2step-Rec). Our approach relies on a committee of profile-specific neural networ...
Olfa Nasraoui, Mrudula Pavuluri