Sciweavers

8322 search results - page 1538 / 1665
» What Are We Looking for
Sort
View
PKC
2011
Springer
185views Cryptology» more  PKC 2011»
13 years 29 days ago
Signatures on Randomizable Ciphertexts
xtended abstract which appears in the 2011 International Conference on Theory and Practice in Public Key Cryptography PKC 2011 (6–9 march 2011, Taormina, Italy) D. Catalano, N. F...
Olivier Blazy, Georg Fuchsbauer, David Pointcheval...
PLDI
2011
ACM
13 years 29 days ago
Understanding POWER multiprocessors
Exploiting today’s multiprocessors requires highperformance and correct concurrent systems code (optimising compilers, language runtimes, OS kernels, etc.), which in turn requir...
Susmit Sarkar, Peter Sewell, Jade Alglave, Luc Mar...
PLPV
2011
ACM
13 years 29 days ago
Local actions for a curry-style operational semantics
Soundness proofs of program logics such as Hoare logics and type systems are often made easier by decorating the operational semantics with information that is useful in the proof...
Gordon Stewart, Andrew W. Appel
ATAL
2011
Springer
12 years 10 months ago
Commitments with regulations: reasoning about safety and control in REGULA
Commitments provide a flexible means for specifying the business relationships among autonomous and heterogeneous agents, and lead to a natural way of enacting such relationships...
Elisa Marengo, Matteo Baldoni, Cristina Baroglio, ...
INFOCOM
2012
IEEE
12 years 17 days ago
Squeezing the most out of interference: An optimization framework for joint interference exploitation and avoidance
—There is a growing interest in exploiting interference (rather than avoiding it) to increase network throughput. In particular, the so-called successive interference cancellatio...
Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou,...
« Prev « First page 1538 / 1665 Last » Next »