-
1
-
-
0031246550
-
The Local Detection Paradigm and Its Applications to Self-Stabilization
-
272
-
Y. Afek, S. Kutten and M. Yung, “The Local Detection Paradigm and Its Applications to Self-Stabilization.” TCS 186 (1-2), pp. 199-229 (1997). 272
-
(1997)
TCS
, vol.186
, Issue.1-2
, pp. 199-229
-
-
Afek, Y.1
Kutten, S.2
Yung, M.3
-
2
-
-
84949300698
-
Fast Checkers for Cryptography
-
271
-
L. Adleman and K. Kompella. “Fast Checkers for Cryptography.” In CRYPTO ’90, pp. 515-529. 271
-
CRYPTO ’90
, pp. 515-529
-
-
Adleman, L.1
Kompella, K.2
-
3
-
-
0026401185
-
Self Stabilizing by local Checking and Correction
-
272
-
B. Awerbuch, B. Patt-Shamir and G. Varghese, “Self Stabilizing by local Checking and Correction.” In FOCS ’91, pp. 268-277. 272
-
FOCS ’91
, pp. 268-277
-
-
Awerbuch, B.1
Patt-Shamir, B.2
Varghese, G.3
-
4
-
-
84947960567
-
Designing programs to check their work
-
270
-
M. Blum, “Designing programs to check their work.” Communications of the ACM. 270
-
Communications of the ACM
-
-
Blum, M.1
-
6
-
-
0026405370
-
Checking the Correctness of Memories
-
271
-
M. Blum, W. Evans, P. Gemmell, S. Kannan, and M. Naor. “Checking the Correctness of Memories.” In FOCS ’91, pp. 90-99. 271
-
FOCS ’91
, pp. 90-99
-
-
Blum, M.1
Evans, W.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
7
-
-
33745511846
-
Hiding Instances in Multioracle Queries
-
281, 281
-
D. Beaver and J. Feigenbaum, “Hiding Instances in Multioracle Queries.” In STACS ’90, pp. 37-48. 281, 281
-
STACS ’90
, pp. 37-48
-
-
Beaver, D.1
Feigenbaum, J.2
-
8
-
-
84949201764
-
Batch Verification with Applications to Cryptography and Checking
-
invited paper, 271
-
M. Bellare, J. Garay and T. Rabin. “Batch Verification with Applications to Cryptography and Checking” (invited paper). In LATIN ’98, pp. 170-191. 271
-
LATIN ’98
, pp. 170-191
-
-
Bellare, M.1
Garay, J.2
Rabin, T.3
-
9
-
-
84898960610
-
Completeness Theorems for Non- Cryptographic Fault-Tolerant Distributed Computation
-
271, 280
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, “Completeness Theorems for Non- Cryptographic Fault-Tolerant Distributed Computation.” In STOC ’88, pp. 1-10. 271, 280
-
STOC ’88
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
10
-
-
0024867752
-
Designing programs to check their work
-
271
-
M. Blum and S. Kannan, “Designing programs to check their work.” In STOC ’89, pp. 86-97. 271
-
STOC ’89
, pp. 86-97
-
-
Blum, M.1
Kannan, S.2
-
11
-
-
0025022876
-
Self-Testing/Correcting with Applications to Numerical Problems
-
270, 270, 270, 271, 271, 271, 273, 273, 274, 275, 280, 282
-
M. Blum, M. Luby, and R. Rubinfeld, “Self-Testing/Correcting with Applications to Numerical Problems.” In STOC ’90, pp. 73-83. 270, 270, 270, 271, 271, 271, 273, 273, 274, 275, 280, 282
-
STOC ’90
, pp. 73-83
-
-
Blum, M.1
Luby, M.2
Rubinfeld, R.3
-
12
-
-
84898947315
-
Multiparty Unconditionally Secure Protocols
-
271, 280
-
D. Chaum, C. Crepeau and I. Damgard. “Multiparty Unconditionally Secure Protocols.” In STOC ’88, pp. 11-19. 271, 280
-
STOC ’88
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
13
-
-
84947960569
-
Simple Constant-Time Consensus Protocols in Realistic Failure Models
-
271, 280
-
B. Chor, M. Merritt, and D. Shmoys, “Simple Constant-Time Consensus Protocols in Realistic Failure Models.” In PODC ’85, pp. 152-162. 271, 280
-
PODC ’85
, pp. 152-162
-
-
Chor, B.1
Merritt, M.2
Shmoys, D.3
-
14
-
-
0009768331
-
The Byzantine Generals Strike Again
-
January, 271, 275
-
D. Dolev, “The Byzantine Generals Strike Again,” Journal of Algorithms, 3(1):14-30, January 1982. 271, 275
-
(1982)
Journal of Algorithms
, vol.3
, Issue.1
, pp. 14-30
-
-
Dolev, D.1
-
15
-
-
0025544954
-
Self Stabilization of Dynamic Systems assuming only Read/Write Atomicity
-
272
-
S. Dolev, A. Israeli and S. Moran, “Self Stabilization of Dynamic Systems assuming only Read/Write Atomicity.” In PODC ’90, pp. 103-117. 272
-
PODC ’90
, pp. 103-117
-
-
Dolev, S.1
Israeli, A.2
Moran, S.3
-
16
-
-
0025499183
-
Knowledge and common knowledge in a Byzantine environment: Crash failures
-
275
-
C. Dwork and Y. Moses, “Knowledge and common knowledge in a Byzantine environment: crash failures.” Information and Computation 88, pp. 156-186 (1990). 275
-
(1990)
Information and Computation
, vol.88
, pp. 156-186
-
-
Dwork, C.1
Moses, Y.2
-
17
-
-
0030387101
-
Approximate Checking of Polynomials and Functional Equations
-
271
-
F. Ergun, S. Ravi Kumar and R. Rubinfeld. “Approximate Checking of Polynomials and Functional Equations.” In FOCS ’96, pp. 592-601. 271
-
FOCS ’96
, pp. 592-601
-
-
Ergun, F.1
Ravi Kumar, S.2
Rubinfeld, R.3
-
18
-
-
0029713931
-
Witness-Based Cryptographic Program Checking and Robust Function Sharing
-
271
-
Y. Frankel, P. Gemmell and M. Yung. “Witness-Based Cryptographic Program Checking and Robust Function Sharing.” In STOC ’96, pp. 499-508. 271
-
STOC ’96
, pp. 499-508
-
-
Frankel, Y.1
Gemmell, P.2
Yung, M.3
-
19
-
-
0001975984
-
Selftesting/ correcting for polynomials and for approximate functions
-
271
-
P. Gemmell, R. Lipton, R. Rubinfeld, M. Sudan, and A. Wigderson. “Selftesting/ correcting for polynomials and for approximate functions.” In STOC ’91, pp. 32-42. 271
-
STOC ’91
, pp. 32-42
-
-
Gemmell, P.1
Lipton, R.2
Rubinfeld, R.3
Sudan, M.4
Wigderson, A.5
-
21
-
-
0001202403
-
Monte-Carlo Approximation Algorithms for Enumeration Problems
-
277
-
R. Karp, M. Luby, and N. Madras, “Monte-Carlo Approximation Algorithms for Enumeration Problems.” Journal of Algorithms 10, pp. 429-448 (1989). 277
-
(1989)
Journal of Algorithms
, vol.10
, pp. 429-448
-
-
Karp, R.1
Luby, M.2
Madras, N.3
-
22
-
-
0025556842
-
Self-Stabilizing Extensions for Message-Passing Systems
-
272
-
S. Katz and K. Perry, “Self-Stabilizing Extensions for Message-Passing Systems.” In PODC ’90, pp. 91-101. 272
-
PODC ’90
, pp. 91-101
-
-
Katz, S.1
Perry, K.2
-
23
-
-
0003013846
-
New Directions in Testing
-
270, 270, 278
-
R. Lipton, “New Directions in Testing,” DIMACS Series in Discrete Mathematics and Theoretical Computer Science, Vol. 2 (1991), pp. 191-202. 270, 270, 278
-
(1991)
DIMACS Series in Discrete Mathematics and Theoretical Computer Science
, vol.2
, pp. 191-202
-
-
Lipton, R.1
-
24
-
-
84976699318
-
The Byzantine Generals Problem
-
271, 275
-
L. Lamport, R.E. Shostak and M. Pease, “The Byzantine Generals Problem,” ACM ToPLaS, Vol. 4, No. 3 (1982), pp. 382-401. 271, 275
-
(1982)
ACM Toplas
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.E.2
Pease, M.3
-
25
-
-
0012785603
-
-
Ph.D. Thesis, ICSI TR-90-054, October, 271, 277
-
R. Rubinfeld, “A Mathematical Theory of Self-Checking, Self-Testing and Self- Correcting Programs.” Ph.D. Thesis, ICSI TR-90-054, October 1990. 271, 277
-
(1990)
A Mathematical Theory of Self-Checking, Self-Testing and Self- Correcting Programs
-
-
Rubinfeld, R.1
-
26
-
-
84947914351
-
On the Robustness of Functional Equations
-
271
-
R. Rubinfeld. “On the Robustness of Functional Equations.” In FOCS ’94, pp. 2-13. 271
-
FOCS ’94
, pp. 2-13
-
-
Rubinfeld, R.1
-
27
-
-
0002858816
-
Designing Checkers for Programs that Run in Parallel
-
271
-
R. Rubinfeld. “Designing Checkers for Programs that Run in Parallel.” Algorithmica 15(4), pp. 287-301, 1996. 271
-
(1996)
Algorithmica
, vol.15
, Issue.4
, pp. 287-301
-
-
Rubinfeld, R.1
|