Sciweavers

870 search results - page 82 / 174
» The failure detector abstraction
Sort
View
CONCUR
2005
Springer
14 years 2 months ago
Timed Spi-Calculus with Types for Secrecy and Authenticity
Abstract. We present a discretely timed spi-calculus. A primitive for key compromise allows us to model key compromise attacks, thus going beyond the standard Dolev–Yao attacker ...
Christian Haack, Alan Jeffrey
GREC
2005
Springer
14 years 2 months ago
Graphics Recognition: The Last Ten Years and the Next Ten Years
Abstract. GREC’05 marked the 10th anniversary of the series of international workshops on graphics recognition, for which the first edition was held in Penn State in 1995. At th...
Karl Tombre
IPTPS
2004
Springer
14 years 2 months ago
Peer-to-Peer Authentication with a Distributed Single Sign-On Service
Abstract. CorSSO is a distributed service for authentication in networks. It allows application servers to delegate client identity checking to combinations of authentication serve...
William K. Josephson, Emin Gün Sirer, Fred B....
APLAS
2007
ACM
14 years 1 months ago
Monadic, Prompt Lazy Assertions in Haskell
Abstract. Assertions test expected properties of run-time values without disrupting the normal computation of a program. We present a library for enriching Haskell programs with as...
Olaf Chitil, Frank Huch
ASPDAC
2005
ACM
123views Hardware» more  ASPDAC 2005»
13 years 11 months ago
Yield driven gate sizing for coupling-noise reduction under uncertainty
Abstract— This paper presents a post-route gate-sizing algorithm for coupling-noise reduction that constrains the yield loss under process variations. Algorithms for coupling-noi...
Debjit Sinha, Hai Zhou