Sciweavers

813 search results - page 39 / 163
» Pipeline-centric provenance model
Sort
View
AICCSA
2006
IEEE
137views Hardware» more  AICCSA 2006»
14 years 1 months ago
Modeling Redundancy: Quantitative and Qualitative Models
Redundancy is a system property that generally refers to duplication of state information or system function. While redundancy is usually investigated in the context of fault tole...
Ali Mili, Lan Wu, Frederick T. Sheldon, Mark Shere...
PROVSEC
2009
Springer
14 years 2 months ago
Chosen-Ciphertext Secure RSA-Type Cryptosystems
This paper explains how to design fully secure RSA-type cryptosystems from schemes only secure against passive attacks, in the standard model. We rely on instance-independence assu...
Benoît Chevallier-Mames, Marc Joye
FMICS
2007
Springer
14 years 1 months ago
Machine Checked Formal Proof of a Scheduling Protocol for Smartcard Personalization
Using PVS (Prototype Verification System), we prove that an industry designed scheduler for a smartcard personalization machine is safe and optimal. This scheduler has previously ...
Leonard Lensink, Sjaak Smetsers, Marko C. J. D. va...
LCPC
2009
Springer
14 years 9 days ago
MIMD Interpretation on a GPU
Programming heterogeneous parallel computer systems is notoriously difficult, but MIMD models have proven to be portable across multi-core processors, clusters, and massively paral...
Henry G. Dietz, B. Dalton Young
SIGGRAPH
1994
ACM
13 years 11 months ago
Piecewise smooth surface reconstruction
We present a general method for automatic reconstruction of accurate, concise, piecewise smooth surface models from scattered range data. The method can be used in a variety of ap...
Hugues Hoppe, Tony DeRose, Tom Duchamp, Mark A. Ha...