Sciweavers

1816 search results - page 47 / 364
» Trace oblivious computation
Sort
View
ASIACRYPT
2003
Springer
15 years 2 months ago
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
We propose a new public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Our scheme is more efficient than the DF scheme suggested by Y. Dodis and N. F...
Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
76
Voted
CAV
2009
Springer
157views Hardware» more  CAV 2009»
15 years 11 months ago
Explaining Counterexamples Using Causality
Abstract. When a model does not satisfy a given specification, a counterexample is produced by the model checker to demonstrate the failure. A user must then examine the counterexa...
Ilan Beer, Shoham Ben-David, Hana Chockler, Avigai...
81
Voted
ICPR
2008
IEEE
15 years 5 months ago
Automatic extraction of natural fracture traces from borehole images
Natural fractures may greatly affect wellbore stability and fluid flow in oil reservoirs. The detection of fracture heterogeneities—also named fracture traces—on electrical im...
Josselin Kherroubi
SIGGRAPH
1999
ACM
15 years 3 months ago
Tracing Ray Differentials
Antialiasing of ray traced images is typically performed by supersampling the image plane. While this type of filtering works well for many algorithms, it is much more efficient t...
Homan Igehy
ICPP
2007
IEEE
15 years 5 months ago
Automatic Trace-Based Parallelization of Java Programs
We propose and evaluate a novel approach for automatic parallelization. The approach uses traces as units of parallel work. We discuss the benefits and challenges of the use of t...
Borys J. Bradel, Tarek S. Abdelrahman