Sciweavers

3122 search results - page 95 / 625
» Storing Semistructured Data with STORED
Sort
View
ACSW
2006
13 years 10 months ago
Logcrypt: forward security and public verification for secure audit logs
Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We b...
Jason E. Holt
COLING
1990
13 years 10 months ago
Language Without A Central Pushdown Stack
We will attempt to show how human performance limitations on various types of syntactic embedding constructions in Germanic languages can be modelled in a relational network lingu...
Carson T. Schütze, Peter A. Reich
CORR
2008
Springer
128views Education» more  CORR 2008»
13 years 9 months ago
Fork Sequential Consistency is Blocking
We consider an untrusted server storing shared data on behalf of clients. We show that no storage access protocol can on the one hand preserve sequential consistency and wait-free...
Christian Cachin, Idit Keidar, Alexander Shraer
TC
1998
13 years 8 months ago
Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP
Abstract—A widely used bus-encryption microprocessor is vulnerable to a new practical attack. This type of processor decrypts onthe-fly while fetching code and data, which are st...
Markus G. Kuhn
ECTEL
2010
Springer
13 years 7 months ago
A Framework for the Domain-Independent Collection of Attention Metadata
Abstract. We present a simple and extendible framework to collect attention metadata and store them for further analysis. Currently, several metadata collectors have been implement...
Maren Scheffel, Martin Friedrich, Katja Niemann, U...