Sciweavers

620 search results - page 70 / 124
» Likelihood Computations Using Value Abstraction
Sort
View
IPPS
2010
IEEE
13 years 7 months ago
Runtime checking of serializability in software transactional memory
Abstract--Ensuring the correctness of complex implementations of software transactional memory (STM) is a daunting task. Attempts have been made to formally verify STMs, but these ...
Arnab Sinha, Sharad Malik
ACCV
2010
Springer
13 years 5 months ago
Minimal Representations for Uncertainty and Estimation in Projective Spaces
Abstract. Estimation using homogeneous entities has to cope with obstacles such as singularities of covariance matrices and redundant parametrizations which do not allow an immedia...
Wolfgang Förstner
ATVA
2007
Springer
87views Hardware» more  ATVA 2007»
14 years 4 months ago
Latticed Simulation Relations and Games
Multi-valued Kripke structures are Kripke structures in which the atomic propositions and the transitions are not Boolean and can take values from some set. In particular, latticed...
Orna Kupferman, Yoad Lustig
EUROCRYPT
2005
Springer
14 years 3 months ago
How to Break MD5 and Other Hash Functions
Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then...
Xiaoyun Wang, Hongbo Yu
LCN
2008
IEEE
14 years 4 months ago
Modeling of multi-resolution active network measurement time-series
Abstract—Active measurements on network paths provide endto-end network health status in terms of metrics such as bandwidth, delay, jitter and loss. Hence, they are increasingly ...
Prasad Calyam, Ananth Devulapalli