Sciweavers

1448 search results - page 26 / 290
» Restricted Stack Implementations
Sort
View
FPL
2004
Springer
75views Hardware» more  FPL 2004»
14 years 28 days ago
Multiple Restricted Multiplication
Abstract. This paper focuses on a class of problem relating to the multiplication of a single number by several coefficients that, while not constant, are drawn from a finite set ...
Nalin Sidahao, George A. Constantinides, Peter Y. ...
TCC
2004
Springer
100views Cryptology» more  TCC 2004»
14 years 26 days ago
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes
In earlier work, we described a “pathological” example of a signature scheme that is secure in the Random Oracle Model, but for which no secure implementation exists. For that...
Ran Canetti, Oded Goldreich, Shai Halevi
AINA
2004
IEEE
13 years 11 months ago
A Personal Tourism Navigation System to Support Traveling Multiple Destinations with Time Restrictions
In this paper, we propose a personal navigation system (called PNS) which navigates a tourist through multiple destinations efficiently. In our PNS, a tourist can specify multiple...
Atsushi Maruyama, Naoki Shibata, Yoshihiro Murata,...
DICS
2006
13 years 9 months ago
Advances in the Design and Implementation of Group Communication Middleware
Abstract. Group communication is a programming abstraction that allows a distributed group of processes to provide a reliable service in spite of the possibility of failures within...
Daniel C. Bünzli, Rachele Fuzzati, Sergio Men...
WDAG
2005
Springer
85views Algorithms» more  WDAG 2005»
14 years 1 months ago
Time and Space Lower Bounds for Implementations Using k-CAS
This paper presents lower bounds on the time- and space-complexity of implementations that use the k compare-and-swap (k-CAS) synchronization primitives. We prove that the use of ...
Hagit Attiya, Danny Hendler