Sciweavers

2814 search results - page 79 / 563
» Can We Make Operating Systems Reliable and Secure
Sort
View
ISER
1997
Springer
91views Robotics» more  ISER 1997»
15 years 8 months ago
Extracting Robotic Part-mating Programs from Operator Interaction with a Simulated Environment
We describe an integrated system for programming part-mating and contact tasks using simulation. A principal goal of this work is to make robotic programming easy and intuitive fo...
John E. Lloyd, Dinesh K. Pai
OSDI
2004
ACM
16 years 4 months ago
Improving the Reliability of Internet Paths with One-hop Source Routing
Recent work has focused on increasing availability in the face of Internet path failures. To date, proposed solutions have relied on complex routing and pathmonitoring schemes, tr...
P. Krishna Gummadi, Harsha V. Madhyastha, Steven D...
LISA
1994
15 years 5 months ago
The Group Administration Shell and the GASH Network Computing Environment
Managing large scale UNIX networks so that users can use resources on multiple systems is traditionally performed using NIS, NFS, and DNS. Proper use of these tools requires exact...
Jonathan Abbey
FAST
2009
15 years 2 months ago
The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance
As increasing amounts of valuable information are produced and persist digitally, the ability to determine the origin of data becomes important. In science, medicine, commerce, an...
Ragib Hasan, Radu Sion, Marianne Winslett
CRYPTO
2003
Springer
173views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
A Tweakable Enciphering Mode
We describe a block-cipher mode of operation, CMC, that turns an n-bit block cipher into a tweakable enciphering scheme that acts on strings of mn bits, where m ≥ 2. When the und...
Shai Halevi, Phillip Rogaway