-
2
-
-
0029534489
-
-
R. Beigel, W. Hurwood, N. Kahale, Fault diagnosis in a flash, in: IEEE Symposium on Foundations of Computer Science, FOCS, 1995, pp. 571-580
-
R. Beigel, W. Hurwood, N. Kahale, Fault diagnosis in a flash, in: IEEE Symposium on Foundations of Computer Science, FOCS, 1995, pp. 571-580
-
-
-
-
3
-
-
0038112683
-
-
R. Beigel, G. Margulis, D.A. Spielman, Fault diagnosis in a small constant number of parallel testing rounds, in: ACM Symposium on Parallel Algorithms and Architectures, SPAA, 1993, pp. 21-29
-
R. Beigel, G. Margulis, D.A. Spielman, Fault diagnosis in a small constant number of parallel testing rounds, in: ACM Symposium on Parallel Algorithms and Architectures, SPAA, 1993, pp. 21-29
-
-
-
-
4
-
-
0026405370
-
Checking the correctness of memories
-
IEEE Computer Society, San Juan, PR
-
Blum M., Evans W., Gemmell P., Kannan S., and Naor M. Checking the correctness of memories. Proc. 32nd Symp. Foundations of Computer Science (Oct. 1991), IEEE Computer Society, San Juan, PR 90-99
-
(1991)
Proc. 32nd Symp. Foundations of Computer Science
, pp. 90-99
-
-
Blum, M.1
Evans, W.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
5
-
-
0024867752
-
-
M. Blum, S. Kannan, Designing programs that check their work, in: Proc. 21st ACM Symp. Theory of Comp., Seattle, Washington, 1989, pp. 86-97
-
M. Blum, S. Kannan, Designing programs that check their work, in: Proc. 21st ACM Symp. Theory of Comp., Seattle, Washington, 1989, pp. 86-97
-
-
-
-
6
-
-
0029214558
-
Designing programs that check their work
-
Blum M., and Kannan S. Designing programs that check their work. J. ACM 42 1 (1995) 269-291
-
(1995)
J. ACM
, vol.42
, Issue.1
, pp. 269-291
-
-
Blum, M.1
Kannan, S.2
-
7
-
-
0000619172
-
Self-testing/correcting with applications to numerical problems
-
Blum M., Luby M., and Rubinfeld R. Self-testing/correcting with applications to numerical problems. J. Comput. Syst. Sci. 47 3 (1993) 549-595
-
(1993)
J. Comput. Syst. Sci.
, vol.47
, Issue.3
, pp. 549-595
-
-
Blum, M.1
Luby, M.2
Rubinfeld, R.3
-
8
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
Cachin C., Micali S., and Stadler M. Computationally private information retrieval with polylogarithmic communication. Lecture Notes in Computer Science vol. 1592 (1999) 402-414
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
10
-
-
26444461543
-
Searching for high-value rare events with uncheatable grid computing
-
3rd Applied Cryptography and Network Security Conference. ACNS, Springer
-
Du W., and Goodrich M.T. Searching for high-value rare events with uncheatable grid computing. 3rd Applied Cryptography and Network Security Conference. ACNS. Lecture Notes in Computer Science vol. 3531 (2005), Springer 122-137
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 122-137
-
-
Du, W.1
Goodrich, M.T.2
-
11
-
-
2442421200
-
-
W. Du, J. Jia, M. Mangal, M. Murugesan, Uncheatable grid computing, in: The 24th International Conference on Distributed Computing Systems, ICDCS'04, Tokyo, Japan, March 23-26, 2004, pp. 4-11
-
W. Du, J. Jia, M. Mangal, M. Murugesan, Uncheatable grid computing, in: The 24th International Conference on Distributed Computing Systems, ICDCS'04, Tokyo, Japan, March 23-26, 2004, pp. 4-11
-
-
-
-
12
-
-
0032761918
-
-
U. Finkler, K. Mehlhorn, Checking priority queues, in: Proc. 10th ACM-SIAM Symp. on Discrete Algorithms, 1999, pp. S901-S902
-
U. Finkler, K. Mehlhorn, Checking priority queues, in: Proc. 10th ACM-SIAM Symp. on Discrete Algorithms, 1999, pp. S901-S902
-
-
-
-
13
-
-
84937555419
-
Uncheatable distributed computations
-
Topics in Cryptology-CT-RSA, The Cryptographer's Track at the RSA Conference, Proceedings, Springer
-
Golle P., and Mironov I. Uncheatable distributed computations. Topics in Cryptology-CT-RSA, The Cryptographer's Track at the RSA Conference, Proceedings. Lecture Notes in Computer Science vol. 2020 (2001), Springer 425-440
-
(2001)
Lecture Notes in Computer Science
, vol.2020
, pp. 425-440
-
-
Golle, P.1
Mironov, I.2
-
14
-
-
84949235873
-
Secure distributed computing in a commercial environment
-
Proceedings of Financial Crypto 2001. Syverson P. (Ed), Springer-Verlag
-
Golle P., and Stubblebine S. Secure distributed computing in a commercial environment. In: Syverson P. (Ed). Proceedings of Financial Crypto 2001. Lecture Notes in Computer Science vol. 2339 (2001), Springer-Verlag 289-304
-
(2001)
Lecture Notes in Computer Science
, vol.2339
, pp. 289-304
-
-
Golle, P.1
Stubblebine, S.2
-
15
-
-
26444620946
-
Cheaters bow to peer pressure
-
Kahney L. Cheaters bow to peer pressure. Wired Magazine Feb. 15 (2001)
-
(2001)
Wired Magazine
, Issue.Feb. 15
-
-
Kahney, L.1
-
17
-
-
0038754189
-
-
D. Kratsh, R. McConnell, K. Mehlhorn, J. Spinrad, Certifying algorithms for recognizing interval and permutation graphs, in: Proc. ACM-SIAM Symp. on Discrete Algorithms, 2003
-
D. Kratsh, R. McConnell, K. Mehlhorn, J. Spinrad, Certifying algorithms for recognizing interval and permutation graphs, in: Proc. ACM-SIAM Symp. on Discrete Algorithms, 2003
-
-
-
-
18
-
-
0003013846
-
New directions in testing
-
Distributed Computing and Cryptography, American Mathematics Society
-
Lipton R. New directions in testing. Distributed Computing and Cryptography. DIMACS Series in Discrete Mathematics and Theoretical Computer Science vol. 2 (1991), American Mathematics Society 191-202
-
(1991)
DIMACS Series in Discrete Mathematics and Theoretical Computer Science
, vol.2
, pp. 191-202
-
-
Lipton, R.1
-
19
-
-
55049117237
-
-
R. Rubinfeld, Designing checkers for programs that run in parallel. Technical Report TR-090-040, International Computer Science Institute, Berkeley, CA, Aug. 1990
-
R. Rubinfeld, Designing checkers for programs that run in parallel. Technical Report TR-090-040, International Computer Science Institute, Berkeley, CA, Aug. 1990
-
-
-
-
20
-
-
0025660767
-
-
G.F. Sullivan, G.M. Masson, Using certification trails to achieve software fault tolerance, in: Digest 1990 Fault Tolerant Comp. Symp., 1990, pp. 423-431
-
G.F. Sullivan, G.M. Masson, Using certification trails to achieve software fault tolerance, in: Digest 1990 Fault Tolerant Comp. Symp., 1990, pp. 423-431
-
-
-
-
22
-
-
84954426305
-
-
D. Szajda, B. Lawson, J. Owen, Hardening functions for large scale distributed computations, in: IEEE Symposium on Security and Privacy, 2003
-
D. Szajda, B. Lawson, J. Owen, Hardening functions for large scale distributed computations, in: IEEE Symposium on Security and Privacy, 2003
-
-
-
-
23
-
-
84974573487
-
-
R.O.W. Aiello, S. Bhatt, S. Rajagopalan, Fast verification of any remote procedure call: Short witness-indistinguishable one-round proofs for np, in: Proceedings of the 27th International Colloquium on Automata, Languages and Programming, July 2000, pp. 463-474
-
R.O.W. Aiello, S. Bhatt, S. Rajagopalan, Fast verification of any remote procedure call: Short witness-indistinguishable one-round proofs for np, in: Proceedings of the 27th International Colloquium on Automata, Languages and Programming, July 2000, pp. 463-474
-
-
-
|