Sciweavers

677 search results - page 101 / 136
» Rigorous Object-Oriented Analysis
Sort
View
ICIP
2007
IEEE
14 years 10 months ago
On the Resolution Limits of Superimposed Projection
Multi-projector super-resolution is the dual of multi-camera superresolution. The goal of projector super-resolution is to produce a high resolution frame via superimposition of m...
Niranjan Damera-Venkata, Nelson L. Chang
DAC
2002
ACM
14 years 9 months ago
A physical model for the transient response of capacitively loaded distributed rlc interconnects
Rapid approximation of the transient response of high-speed global interconnects is needed to estimate the time delay, crosstalk, and overshoot in a GSI multilevel wiring network....
Raguraman Venkatesan, Jeffrey A. Davis, James D. M...
POPL
2009
ACM
14 years 9 months ago
The semantics of x86-CC multiprocessor machine code
Multiprocessors are now dominant, but real multiprocessors do not provide the sequentially consistent memory that is assumed by most work on semantics and verification. Instead, t...
Susmit Sarkar, Peter Sewell, Francesco Zappa Narde...
ESORICS
2009
Springer
14 years 9 months ago
Authentic Time-Stamps for Archival Storage
Abstract. We study the problem of authenticating the content and creation time of documents generated by an organization and retained in archival storage. Recent regulations (e.g.,...
Alina Oprea, Kevin D. Bowers
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
14 years 9 months ago
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed unde...
Colin Boyd, Juan Manuel González Nieto, M. ...