Sciweavers

239 search results - page 31 / 48
» Proof Techniques for Cryptographic Processes
Sort
View
ISTCS
1992
Springer
14 years 4 days ago
Concurrent Timestamping Made Simple
Concurrent Time-stamp Systems (ctss) allow processes to temporally order concurrent events in an asynchronous shared memorysystem, a powerful tool for concurrency control, serving...
Rainer Gawlick, Nancy A. Lynch, Nir Shavit
ISBI
2008
IEEE
14 years 3 months ago
Theoretical analysis of complex-conjugate-ambiguity suppression in frequency-domain optical-coherence tomography
New phase-shifting techniques have recently been proposed to suppress the complex-conjugate ambiguity in frequencydomain optical-coherence tomography. A phase shift is introduced,...
S. Chandra Sekhar, Roland Michaely, Rainer A. Leit...
CALCO
2007
Springer
100views Mathematics» more  CALCO 2007»
14 years 2 months ago
Applications of Metric Coinduction
Metric coinduction is a form of coinduction that can be used to establish properties of objects constructed as a limit of finite approximations. One can prove a coinduction step s...
Dexter Kozen, Nicholas Ruozzi
SOSP
2003
ACM
14 years 5 months ago
Implementing an untrusted operating system on trusted hardware
Recently, there has been considerable interest in providing “trusted computing platforms” using hardware — TCPA and Palladium being the most publicly visible examples. In th...
David Lie, Chandramohan A. Thekkath, Mark Horowitz
CCGRID
2006
IEEE
14 years 2 months ago
An Overview of Security Issues in Cluster Interconnects
— Widespread use of cluster systems in diverse set of applications has spurred significant interest in providing high performance cluster interconnects. A major inefficiency in...
Manhee Lee, Eun Jung Kim, Ki Hwan Yum, Mazin S. Yo...