Sciweavers

1895 search results - page 187 / 379
» Modular Functional Descriptions
Sort
View
94
Voted
CRYPTO
2000
Springer
110views Cryptology» more  CRYPTO 2000»
15 years 6 months ago
Parallel Reducibility for Information-Theoretically Secure Computation
Secure Function Evaluation (SFE) protocols are very hard to design, and reducibility has been recognized as a highly desirable property of SFE protocols. Informally speaking, reduc...
Yevgeniy Dodis, Silvio Micali
RTCSA
1998
IEEE
15 years 6 months ago
Partition Scheduling in APEX Runtime Environment for Embedded Avionics Software
Advances in the computer technology encouraged the avionics industry to replace the federated design of control units with an integrated suite of control modules that share the co...
Yann-Hang Lee, Daeyoung Kim, Mohamed F. Younis, Je...
AOSD
2007
ACM
15 years 6 months ago
Open bisimulation for aspects
We define and study bisimulation for proving contextual equivalence in an aspect extension of the untyped lambda-calculus. To our knowledge, this is the first study of coinductive...
Radha Jagadeesan, Corin Pitcher, James Riely
MFCS
1995
Springer
15 years 5 months ago
An Abstract Account of Composition
act Account of Composition Mart n Abadi1 and Stephan Merz2 1 Digital Equipment Corporation, Systems Research Center, 130 Lytton Avenue, Palo Alto, CA 94301, U.S.A. 2 Institut fur I...
Martín Abadi, Stephan Merz
USENIX
2007
15 years 4 months ago
Reboots Are for Hardware: Challenges and Solutions to Updating an Operating System on the Fly
Patches to modern operating systems, including bug fixes and security updates, and the reboots and downtime they require, cause tremendous problems for system users and administr...
Andrew Baumann, Jonathan Appavoo, Robert W. Wisnie...