Research and Tech Reports - Computer Science

Recent AdditionsRSS feed

  • Roohi, Nima; Prabhakar, Pavithra; Viswanathan, Mahesh (2016)

    application/pdf

    application/pdfPDF (660kB)
  • Matthew S. Bauer, Rohit Chadha and Mahesh Viswanathan (2016)
    Recently, several composition results have been established, showing that two cryptographic protocols proven secure against a Dolev-Yao adversary continue to afford the same security guarantees when composed together, ...

    application/pdf

    application/pdfPDF (485kB)
  • Jose Meseguer (2015-11)
    Although different satisfiability decision procedures can be combined by algorithms such as those of Nelson-Oppen or Shostak, current tools typically can only support a finite number of theories to use in such ...

    application/pdf

    application/pdfPDF (656kB)
  • Yoon, Man-Ki; Mohan, Sibin; Chen, Chien-Ying; Sha, Lui (2015-10-15)
    The high degree of predictability in hard real-time systems makes it possible for adversaries to launch timing inference attacks such as those based on side-channels and covert-channels. We present SCOBE, an obfuscation ...

    application/pdf

    application/pdfPDF (2MB)
  • Alessandra Melani; Renato Mancuso; Daniel Cullina; Marco Caccamo; Lothar Thiele (2015-11-12)
    Multiple resource co-scheduling algorithms and pipelined execution models are becoming increasingly popular, as they better capture the heterogeneous nature of modern architectures. The problem of scheduling tasks composed ...

    application/pdf

    application/pdfPDF (449kB)

Collection Statistics

  • Total Downloads: 518969
  • Downloads this Month: 4359
  • Downloads Today: 363
  • Statistics Report