Author of the publication

Asymptotically Tight Bounds for Computing with Faulty Arrays of Processors (Extended Abstract)

, , , , , , , and . FOCS, page 285-296. IEEE Computer Society, (1990)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An experiment on the impact of transparency on the effectiveness of requirements documents., , and . Empirical Software Engineering, 21 (3): 1035-1066 (2016)Foundation for Systems Security.. AISC, volume 98 of CRPIT, page 3. Australian Computer Society, (2009)Rectilinear Steiner Tree Minimization on a Workstation., , and . Computational Support for Discrete Mathematics, volume 15 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 119-136. DIMACS/AMS, (1992)Securing Mobile Agents Control Flow Using Opaque Predicates., and . KES (3), volume 3683 of Lecture Notes in Computer Science, page 1065-1071. Springer, (2005)Specifying Imperative Data Obfuscations., , and . ISC, volume 4779 of Lecture Notes in Computer Science, page 299-314. Springer, (2007)A Framework for System Security.. Handbook of Information and Communication Security, Springer, (2010)Delay optimization of carry-skip adders and block carry-lookahead adders., , , and . IEEE Symposium on Computer Arithmetic, page 154-164. IEEE, (1991)Manufacturing opaque predicates in distributed systems for code obfuscation., and . ACSC, volume 48 of CRPIT, page 187-196. Australian Computer Society, (2006)Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs., , and . POPL, page 184-196. ACM, (1998)A Survey of Software Watermarking., , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 454-458. Springer, (2005)