Browsing LCS Publications by Title
Now showing items 850-869 of 1163
-
Propositional Dynamic Logic of Looping and Converse
(1981-05)Dynamic logic [5,6,15,16] applies concepts from modal logic to a relational semantics of programs to yield various systems for reasoning about the before-after behavior of programs. Analogues to the modal logic assertions ... -
Protecting Externally Supplied Software in Small Computers
(1981-03)The increasing decentralization of computing resources and the proliferation of personal and small business computers create new problems in computer security. One such problem is the protection of externally supplied ... -
Protein Folding in the Generalized Hydrophobic-Polar Model on the Triangular Lattice
(1996-05)We consider the problem of determining the three-dimensional folding of a protein given its one-dimensional amino sequence. The model we use is based on the Hydrophobic-Polar (HP) model [2] on cubic lattices in which the ... -
Proteus: A High-performance Parallel-architecture Simulator
(1991-09)PROTEUS is a high-performance simulator for MIMD multiprocessors. It is fast, accurate, and flexible: it is one to two orders of magnitude faster than comparable simulators, it can reproduce results from real multiprocessors, ... -
Protosystem I: An Automatic Programming System Prototype
(1976-07)A model of the data processing system writing process is given in terms of development stages. These stages correspond to the progression in the implementation and design process from the highest level of abstraction ... -
Proving Correctness of a Controller Algorithm for the RAID Level 5 System
Mos RAID controllers implemented in industry are complicated and difficult to reason about. This complexity has led to software and hardware systems that are difficult to debug and hard to modify. To overcome this problem ... -
Proving Correctness of a Distributed Shared Memory Implementation
(1999-1)DiSOM [3,4,2] is a distributed shared memory system that offers users an atomic collection of memory cells provided they satisfy certain well-formedness conditions. This report proves the correctness of DiSOM. The system ... -
Pseudo-random Sequences
(1970-10)The purpose of this paper is to study some notions of randomnes for infinite sequences of 0's and 1's. -
pStore: A Secure Peer-to-Peer Backup System
(2002-10)In an effort to combine research in peer-to-peer systems with techniques for incremental backup systems, we propose pStore: a secure distributed backup system based on an adaptive peer-to-peer network. pStore exploits ... -
Public-Key Cryptosystems from Lattice Reduction Problems
(1996-11)We present a new proposal for a trapdoor one-way function, from which we derive public-key encryption and digital signatures. The security of the new construction is based on the conjectured computational difficulty of ... -
QoS Preserving Totally Ordered Multicast
(2000-01)This paper studies the Quality of Service (QoS) guarantees of totally ordered multicast algorithms. The paper shows that totally ordered multicast can coexist with guaranteed predictable delays in certain network models. ... -
Qualitative Mathematical Reasoning
(1984-11)Qualitative analysis is the study of abstract causal reasoning. It explores the mechanisms whereby humans analyze complex systems abstractly, while ignoring unimportant and unknown low-level details. Previous research ... -
Qualitative Simulation in Medical Physiology: A Progress Report
(1985-06)This progress report describes the current status of the application of the QSIM qualitative simulation representation and algorithm to mechanisms drawn from medical physiology. QSIM takes a qualitative description of the ... -
Qualitative Simulation of Mechanisms
(1985-04)Qualitative simulation is a key inference process in qualitative causal reasoning. However, the precise meaning of the different proposals and their relation with differential equations is often unclear. In this paper, we ... -
Quantitative Performance Modeling of Scientific Computations
(1995-05)The first part of the thesis demonstrates that the performance of programs can be predicted accurately, automatically, and rapidly using a method called benchmapping. The key aspects benchmapping are: automatic creation ... -
Queueing Models for File Memory Operation
(1965-10)A model for the auxiliary memory function of a segmented, multiprocessor, time-shared computer system is set up. A drum system in particular is discussed, although no loss of generality is implied by limiting the discussion ...