Sciweavers

796 search results - page 104 / 160
» Spoofing prevention method
Sort
View
CONCUR
2007
Springer
14 years 4 months ago
Fair Cooperative Multithreading
Abstract. We propose a new operational model for shared variable concurrency, in the context of a concurrent, higher-order imperative language `a la ML. In our model the scheduling...
Gérard Boudol
CSL
2007
Springer
14 years 4 months ago
A Cut-Free and Invariant-Free Sequent Calculus for PLTL
Abstract. Sequent calculi usually provide a general deductive setting that uniformly embeds other proof-theoretical approaches, such as tableaux methods, resolution techniques, goa...
Joxe Gaintzarain, Montserrat Hermo, Paqui Lucio, M...
DAGM
2007
Springer
14 years 4 months ago
Classifying Glaucoma with Image-Based Features from Fundus Photographs
Glaucoma is one of the most common causes of blindness and it is becoming even more important considering the ageing society. Because healing of died retinal nerve fibers is not p...
Rüdiger Bock, Jörg Meier, Georg Michelso...
FC
2007
Springer
118views Cryptology» more  FC 2007»
14 years 4 months ago
K-Anonymous Multi-party Secret Handshakes
Abstract. Anonymity-protection techniques are crucial for various commercial and financial transactions, where participants are worried about their privacy. On the other hand, aut...
Shouhuai Xu, Moti Yung
HPCC
2007
Springer
14 years 4 months ago
Journal Remap-Based FTL for Journaling File System with Flash Memory
Abstract. Constructing flash memory based storage, FTL (Flash Translation Layer) manages mapping between logical address and physical address. Since FTL writes every data to new r...
Seung Ho Lim, Hyun-Jin Choi, Kyu Ho Park