Sciweavers

64 search results - page 12 / 13
» Fences in Weak Memory Models
Sort
View
CCS
2008
ACM
14 years 20 days ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 11 months ago
A probabilistic and RIPless theory of compressed sensing
This paper introduces a simple and very general theory of compressive sensing. In this theory, the sensing mechanism simply selects sensing vectors independently at random from a ...
Emmanuel J. Candès, Yaniv Plan
EC
2006
97views ECommerce» more  EC 2006»
13 years 11 months ago
A Step Forward in Studying the Compact Genetic Algorithm
The compact Genetic Algorithm (cGA) is an Estimation of Distribution Algorithm that generates offspring population according to the estimated probabilistic model of the parent pop...
Reza Rastegar, Arash Hariri
OOPSLA
2009
Springer
14 years 5 months ago
The design of a task parallel library
The Task Parallel Library (TPL) is a library for .NET that makes it easy to take advantage of potential parallelism in a program. The library relies heavily on generics and delega...
Daan Leijen, Wolfram Schulte, Sebastian Burckhardt
JAVA
2001
Springer
14 years 3 months ago
Core semantics of multithreaded Java
Java has integrated multithreading to a far greater extent than most programming languages. It is also one of the only languages that specifies and requires safety guarantees for...
Jeremy Manson, William Pugh