Sciweavers

135 search results - page 19 / 27
» Cryptographic Protocol Analysis on Real C Code
Sort
View
SIAMAM
2008
107views more  SIAMAM 2008»
13 years 5 months ago
Local Tomography in Electron Microscopy
We present a new local tomographic algorithm applicable to electron microscope tomography. Our algorithm applies to the standard data acquisition method, single-axis tilting, as we...
Eric Todd Quinto, Ozan Öktem
SOSP
2007
ACM
14 years 4 months ago
Triage: diagnosing production run failures at the user's site
Diagnosing production run failures is a challenging yet important task. Most previous work focuses on offsite diagnosis, i.e. development site diagnosis with the programmers prese...
Joseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanth...
ISCC
2003
IEEE
14 years 22 days ago
On the Issues of IP Traceback for IPv6 and Mobile IPv6
As the Internet becomes pervasive, the vulnerability of some fundamental design aspects of the Internet has also become significant. Among which, Denial-of-Service (DoS) and Distr...
Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi...
SIGSOFT
2007
ACM
14 years 8 months ago
Programming asynchronous layers with CLARITY
Asynchronous systems components are hard to write, hard to reason about, and (not coincidentally) hard to mechanically verify. In order to achieve high performance, asynchronous c...
Prakash Chandrasekaran, Christopher L. Conway, Jos...
STOC
2000
ACM
174views Algorithms» more  STOC 2000»
13 years 11 months ago
Noise-tolerant learning, the parity problem, and the statistical query model
We describe a slightly subexponential time algorithm for learning parity functions in the presence of random classification noise, a problem closely related to several cryptograph...
Avrim Blum, Adam Kalai, Hal Wasserman