메뉴 건너뛰기




Volumn 379, Issue 3, 2007, Pages 418-436

Efficient pebbling for list traversal synopses with application to program rollback

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; BINARY SEQUENCES; COMPUTATIONAL EFFICIENCY; COMPUTER PROGRAMMING; GRAPH THEORY;

EID: 34248571259     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2007.02.048     Document Type: Article
Times cited : (2)

References (25)
  • 1
    • 0032628275 scopus 로고    scopus 로고
    • A.M. Ben-Amram, H. Petersen, Backing up in singly linked lists, in: ACM Symposium on Theory of Computing, 1999, pp. 780-786
  • 2
    • 0031632860 scopus 로고    scopus 로고
    • M.A. Bender, A. Fernandez, D. Ron, A. Sahai, S.P. Vadhan, The power of a pebble: Exploring and mapping directed graphs, in: ACM Symposium on Theory of Computing, 1998, pp. 269-278
  • 3
    • 84976813455 scopus 로고    scopus 로고
    • A.K. Chandra, Efficient compilation of linear recursive programs, in: 14th Annual IEEE Symposium on Foundations of Computer Science, 1973, pp. 16-25
  • 5
    • 34248536219 scopus 로고    scopus 로고
    • D. Coppersmith, M. Jakobsson, Almost optimal hash sequence traversal, in: Fifth Conference on Financial Cryptography, 2002, pp. 102-119
  • 6
    • 84968735289 scopus 로고    scopus 로고
    • M. Datar, A. Gionis, P. Indyk, R. Motwani, Maintaining stream statistics over sliding windows, in: Proc. of the 13th annual ACM-SIAM symposium on Discrete algorithms, 2002, pp. 635-644
  • 7
    • 33746994112 scopus 로고    scopus 로고
    • M. Furman, Y. Matias, E. Porat, LTS: The List-Traversal Synopses System, in: NGITS, 2006, pp. 353-354
  • 8
    • 0032762085 scopus 로고    scopus 로고
    • P. Gibbons, Y. Matias, Synopsis data structures for massive data sets, in: Proc. of the tenth annual ACM-SIAM symposium on Discrete algorithms, 1999, pp. 909-910
  • 10
    • 84880879872 scopus 로고    scopus 로고
    • Gene itkis and leonid reyzin and verifying
    • Itkis G., and Reyzin L. Gene itkis and leonid reyzin and verifying. CRYPTO (2001) 332-354
    • (2001) CRYPTO , pp. 332-354
    • Itkis, G.1    Reyzin, L.2
  • 11
    • 0036352143 scopus 로고    scopus 로고
    • M. Jakobsson, Fractal hash sequence representation and traversal, in: IEEE International Symposium on Information Theory, 2002, p. 437
  • 12
    • 33750582886 scopus 로고    scopus 로고
    • Fractal merkle tree representation and traversal
    • Jakobsson M., Leighton T., Micali S., and Szydlo M. Fractal merkle tree representation and traversal. CT-RSA (2003) 314-326
    • (2003) CT-RSA , pp. 314-326
    • Jakobsson, M.1    Leighton, T.2    Micali, S.3    Szydlo, M.4
  • 13
    • 35248842541 scopus 로고    scopus 로고
    • A. Kozlov, L. Reyzin, Forward-secure signatures with fast key update, in: Third Conference on Security in Communication Networks, 2002, pp. 241-256
  • 14
    • 0019634370 scopus 로고
    • Password authentification with insecure communication
    • Lamport L. Password authentification with insecure communication. Communications of the ACM 24 11 (1981) 770-772
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 15
    • 34248504559 scopus 로고    scopus 로고
    • Y. Matias, E. Porat, Efficient pebbling for list traversal synopses, Technical Report, Tel Aviv University, 2001 (revised 2002)
  • 16
    • 35248885103 scopus 로고    scopus 로고
    • Y. Matias, E. Porat, Efficient pebbling for list traversal synopses, in: International Colloquium on Automata, Languages and Programming, 2003, pp. 918-928
  • 17
    • 0035752112 scopus 로고    scopus 로고
    • A. Perrig, The biba one-time signature and broadcast authentication protocol, in: ACM Conference on Computer and Communications Security, 2001, pp. 28-37
  • 18
    • 84968490873 scopus 로고    scopus 로고
    • N. Pippenger, Advances in pebbling, in: International Colloquium on Automata, Languages and Programming, 1982, pp. 407-417
  • 19
    • 34248551613 scopus 로고    scopus 로고
    • R.L. Rivest, A. Shamir, Payword and micromint: Two simple micropayment schemes, in: Security Protocols Workshop, 1996, pp. 69-87
  • 20
    • 0001361340 scopus 로고
    • An efficient machineindependent procedure for garbage collection in various list structures
    • Schorr H., and Waite W.M. An efficient machineindependent procedure for garbage collection in various list structures. Communications of the ACM 10 8 (1967) 501-506
    • (1967) Communications of the ACM , vol.10 , Issue.8 , pp. 501-506
    • Schorr, H.1    Waite, W.M.2
  • 21
    • 35248833199 scopus 로고    scopus 로고
    • On the computation-storage trade-offs of hash chain traversal
    • Sella Y. On the computation-storage trade-offs of hash chain traversal. Financial Cryptography (2003) 270-285
    • (2003) Financial Cryptography , pp. 270-285
    • Sella, Y.1
  • 22
    • 34248534206 scopus 로고
    • Fast and read-only algorithms for traversing trees without an auxiliary stack
    • Siklossy L. Fast and read-only algorithms for traversing trees without an auxiliary stack. Information Processing Letters 1 (1972) 149-152
    • (1972) Information Processing Letters , vol.1 , pp. 149-152
    • Siklossy, L.1
  • 23
    • 17244362429 scopus 로고    scopus 로고
    • J. Sobel, D.P. Friedman, Recycling continuations, ACM SIGPLAN International Conference on Functional Programming 34 (1) (1999) 251-260
  • 24
    • 35048813651 scopus 로고    scopus 로고
    • Merkle tree traversal in log space and time
    • Szydlo M. Merkle tree traversal in log space and time. Eurocrypt (2004) 541-554
    • (2004) Eurocrypt , pp. 541-554
    • Szydlo, M.1
  • 25
    • 84959039734 scopus 로고    scopus 로고
    • Alias types for recursive data structures
    • Walker D., and Morrisett J.G. Alias types for recursive data structures. Types in Compilation (2000) 177-206
    • (2000) Types in Compilation , pp. 177-206
    • Walker, D.1    Morrisett, J.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.