Sciweavers

3228 search results - page 581 / 646
» Computationally Sound Proofs
Sort
View
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
13 years 13 days ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
HUC
2011
Springer
12 years 8 months ago
Haptic reassurance in the pitch black for an immersive theatre experience
An immersive theatre experience was designed to raise awareness and question perceptions of ‘blindness’, through enabling both sighted and blind members to experience a simila...
Janet van der Linden, Yvonne Rogers, Maria Oshodi,...
ICALP
2009
Springer
14 years 9 months ago
Secure Function Collection with Sublinear Storage
Consider a center possessing a trusted (tamper proof) device that wishes to securely compute a public function over private inputs that are contributed by some network nodes. In ne...
Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong...
IPPS
2009
IEEE
14 years 3 months ago
Coupled placement in modern data centers
We introduce the coupled placement problem for modern data centers spanning placement of application computation and data among available server and storage resources. While the t...
Madhukar R. Korupolu, Aameek Singh, Bhuvan Bamba
FOCS
2007
IEEE
14 years 3 months ago
The Power of Quantum Systems on a Line
: We study the computational strength of quantum particles (each of finite dimensionality) arranged on a line. First, we prove that it is possible to perform universal adiabatic q...
Dorit Aharonov, Daniel Gottesman, Sandy Irani, Jul...