Sciweavers

533 search results - page 83 / 107
» Protocol synthesis from timed and structured specifications
Sort
View
CAV
2007
Springer
108views Hardware» more  CAV 2007»
14 years 5 months ago
Systematic Acceleration in Regular Model Checking
Abstract. Regular model checking is a form of symbolic model checking technique for systems whose states can be represented as finite words over a finite alphabet, where regular ...
Bengt Jonsson, Mayank Saksena
MEDIAFORENSICS
2010
14 years 12 days ago
Managing a large database of camera fingerprints
Sensor fingerprint is a unique noise-like pattern caused by slightly varying pixel dimensions and inhomogeneity of the silicon wafer from which the sensor is made. The fingerprint...
Miroslav Goljan, Jessica J. Fridrich, Tomás...
ISCA
2009
IEEE
199views Hardware» more  ISCA 2009»
14 years 5 months ago
SigRace: signature-based data race detection
Detecting data races in parallel programs is important for both software development and production-run diagnosis. Recently, there have been several proposals for hardware-assiste...
Abdullah Muzahid, Darío Suárez Graci...
MTA
2006
115views more  MTA 2006»
13 years 11 months ago
Tree-assisted gossiping for overlay video distribution
Given its readily deployable nature and broad applications for digital entertainment, video streaming through overlay networks has received much attention recently. While a tree to...
Jiangchuan Liu, Ming Zhou
JOC
2007
94views more  JOC 2007»
13 years 10 months ago
On Unconditionally Secure Distributed Oblivious Transfer
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinkas. In this setting a Sender has n secrets and a Receiver is interested in one o...
Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Dou...