메뉴 건너뛰기




Volumn 1693, Issue , 1999, Pages 269-284

Self-testing/correcting protocols

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS;

EID: 84947924339     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48169-9_19     Document Type: Conference Paper
Times cited : (5)

References (27)
  • 1
    • 0031246550 scopus 로고    scopus 로고
    • The Local Detection Paradigm and Its Applications to Self-Stabilization
    • 272
    • Y. Afek, S. Kutten and M. Yung, “The Local Detection Paradigm and Its Applications to Self-Stabilization.” TCS 186 (1-2), pp. 199-229 (1997). 272
    • (1997) TCS , vol.186 , Issue.1-2 , pp. 199-229
    • Afek, Y.1    Kutten, S.2    Yung, M.3
  • 2
    • 84949300698 scopus 로고    scopus 로고
    • Fast Checkers for Cryptography
    • 271
    • L. Adleman and K. Kompella. “Fast Checkers for Cryptography.” In CRYPTO ’90, pp. 515-529. 271
    • CRYPTO ’90 , pp. 515-529
    • Adleman, L.1    Kompella, K.2
  • 3
    • 0026401185 scopus 로고    scopus 로고
    • Self Stabilizing by local Checking and Correction
    • 272
    • B. Awerbuch, B. Patt-Shamir and G. Varghese, “Self Stabilizing by local Checking and Correction.” In FOCS ’91, pp. 268-277. 272
    • FOCS ’91 , pp. 268-277
    • Awerbuch, B.1    Patt-Shamir, B.2    Varghese, G.3
  • 4
    • 84947960567 scopus 로고    scopus 로고
    • Designing programs to check their work
    • 270
    • M. Blum, “Designing programs to check their work.” Communications of the ACM. 270
    • Communications of the ACM
    • Blum, M.1
  • 7
    • 33745511846 scopus 로고    scopus 로고
    • Hiding Instances in Multioracle Queries
    • 281, 281
    • D. Beaver and J. Feigenbaum, “Hiding Instances in Multioracle Queries.” In STACS ’90, pp. 37-48. 281, 281
    • STACS ’90 , pp. 37-48
    • Beaver, D.1    Feigenbaum, J.2
  • 8
    • 84949201764 scopus 로고    scopus 로고
    • Batch Verification with Applications to Cryptography and Checking
    • invited paper, 271
    • M. Bellare, J. Garay and T. Rabin. “Batch Verification with Applications to Cryptography and Checking” (invited paper). In LATIN ’98, pp. 170-191. 271
    • LATIN ’98 , pp. 170-191
    • Bellare, M.1    Garay, J.2    Rabin, T.3
  • 9
    • 84898960610 scopus 로고    scopus 로고
    • Completeness Theorems for Non- Cryptographic Fault-Tolerant Distributed Computation
    • 271, 280
    • M. Ben-Or, S. Goldwasser, and A. Wigderson, “Completeness Theorems for Non- Cryptographic Fault-Tolerant Distributed Computation.” In STOC ’88, pp. 1-10. 271, 280
    • STOC ’88 , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 10
    • 0024867752 scopus 로고    scopus 로고
    • Designing programs to check their work
    • 271
    • M. Blum and S. Kannan, “Designing programs to check their work.” In STOC ’89, pp. 86-97. 271
    • STOC ’89 , pp. 86-97
    • Blum, M.1    Kannan, S.2
  • 11
    • 0025022876 scopus 로고    scopus 로고
    • Self-Testing/Correcting with Applications to Numerical Problems
    • 270, 270, 270, 271, 271, 271, 273, 273, 274, 275, 280, 282
    • M. Blum, M. Luby, and R. Rubinfeld, “Self-Testing/Correcting with Applications to Numerical Problems.” In STOC ’90, pp. 73-83. 270, 270, 270, 271, 271, 271, 273, 273, 274, 275, 280, 282
    • STOC ’90 , pp. 73-83
    • Blum, M.1    Luby, M.2    Rubinfeld, R.3
  • 12
    • 84898947315 scopus 로고    scopus 로고
    • Multiparty Unconditionally Secure Protocols
    • 271, 280
    • D. Chaum, C. Crepeau and I. Damgard. “Multiparty Unconditionally Secure Protocols.” In STOC ’88, pp. 11-19. 271, 280
    • STOC ’88 , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgard, I.3
  • 13
    • 84947960569 scopus 로고    scopus 로고
    • Simple Constant-Time Consensus Protocols in Realistic Failure Models
    • 271, 280
    • B. Chor, M. Merritt, and D. Shmoys, “Simple Constant-Time Consensus Protocols in Realistic Failure Models.” In PODC ’85, pp. 152-162. 271, 280
    • PODC ’85 , pp. 152-162
    • Chor, B.1    Merritt, M.2    Shmoys, D.3
  • 14
    • 0009768331 scopus 로고
    • The Byzantine Generals Strike Again
    • January, 271, 275
    • D. Dolev, “The Byzantine Generals Strike Again,” Journal of Algorithms, 3(1):14-30, January 1982. 271, 275
    • (1982) Journal of Algorithms , vol.3 , Issue.1 , pp. 14-30
    • Dolev, D.1
  • 15
    • 0025544954 scopus 로고    scopus 로고
    • Self Stabilization of Dynamic Systems assuming only Read/Write Atomicity
    • 272
    • S. Dolev, A. Israeli and S. Moran, “Self Stabilization of Dynamic Systems assuming only Read/Write Atomicity.” In PODC ’90, pp. 103-117. 272
    • PODC ’90 , pp. 103-117
    • Dolev, S.1    Israeli, A.2    Moran, S.3
  • 16
    • 0025499183 scopus 로고
    • Knowledge and common knowledge in a Byzantine environment: Crash failures
    • 275
    • C. Dwork and Y. Moses, “Knowledge and common knowledge in a Byzantine environment: crash failures.” Information and Computation 88, pp. 156-186 (1990). 275
    • (1990) Information and Computation , vol.88 , pp. 156-186
    • Dwork, C.1    Moses, Y.2
  • 17
    • 0030387101 scopus 로고    scopus 로고
    • Approximate Checking of Polynomials and Functional Equations
    • 271
    • F. Ergun, S. Ravi Kumar and R. Rubinfeld. “Approximate Checking of Polynomials and Functional Equations.” In FOCS ’96, pp. 592-601. 271
    • FOCS ’96 , pp. 592-601
    • Ergun, F.1    Ravi Kumar, S.2    Rubinfeld, R.3
  • 18
    • 0029713931 scopus 로고    scopus 로고
    • Witness-Based Cryptographic Program Checking and Robust Function Sharing
    • 271
    • Y. Frankel, P. Gemmell and M. Yung. “Witness-Based Cryptographic Program Checking and Robust Function Sharing.” In STOC ’96, pp. 499-508. 271
    • STOC ’96 , pp. 499-508
    • Frankel, Y.1    Gemmell, P.2    Yung, M.3
  • 19
    • 0001975984 scopus 로고    scopus 로고
    • Selftesting/ correcting for polynomials and for approximate functions
    • 271
    • P. Gemmell, R. Lipton, R. Rubinfeld, M. Sudan, and A. Wigderson. “Selftesting/ correcting for polynomials and for approximate functions.” In STOC ’91, pp. 32-42. 271
    • STOC ’91 , pp. 32-42
    • Gemmell, P.1    Lipton, R.2    Rubinfeld, R.3    Sudan, M.4    Wigderson, A.5
  • 21
    • 0001202403 scopus 로고
    • Monte-Carlo Approximation Algorithms for Enumeration Problems
    • 277
    • R. Karp, M. Luby, and N. Madras, “Monte-Carlo Approximation Algorithms for Enumeration Problems.” Journal of Algorithms 10, pp. 429-448 (1989). 277
    • (1989) Journal of Algorithms , vol.10 , pp. 429-448
    • Karp, R.1    Luby, M.2    Madras, N.3
  • 22
    • 0025556842 scopus 로고    scopus 로고
    • Self-Stabilizing Extensions for Message-Passing Systems
    • 272
    • S. Katz and K. Perry, “Self-Stabilizing Extensions for Message-Passing Systems.” In PODC ’90, pp. 91-101. 272
    • PODC ’90 , pp. 91-101
    • Katz, S.1    Perry, K.2
  • 24
    • 84976699318 scopus 로고
    • The Byzantine Generals Problem
    • 271, 275
    • L. Lamport, R.E. Shostak and M. Pease, “The Byzantine Generals Problem,” ACM ToPLaS, Vol. 4, No. 3 (1982), pp. 382-401. 271, 275
    • (1982) ACM Toplas , vol.4 , Issue.3 , pp. 382-401
    • Lamport, L.1    Shostak, R.E.2    Pease, M.3
  • 26
    • 84947914351 scopus 로고    scopus 로고
    • On the Robustness of Functional Equations
    • 271
    • R. Rubinfeld. “On the Robustness of Functional Equations.” In FOCS ’94, pp. 2-13. 271
    • FOCS ’94 , pp. 2-13
    • Rubinfeld, R.1
  • 27
    • 0002858816 scopus 로고    scopus 로고
    • Designing Checkers for Programs that Run in Parallel
    • 271
    • R. Rubinfeld. “Designing Checkers for Programs that Run in Parallel.” Algorithmica 15(4), pp. 287-301, 1996. 271
    • (1996) Algorithmica , vol.15 , Issue.4 , pp. 287-301
    • Rubinfeld, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.