Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,275,343 papers from all fields of science
Search
Sign In
Create Free Account
Liveness
Known as:
Bounded bypass
In concurrent computing, liveness refers to a set of properties of concurrent systems, that require a system to make progress despite the fact that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Chang and Roberts algorithm
Computation tree logic
Concurrent computing
Critical section
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Fingerprint Liveness Detection Using Convolutional Neural Networks
Rodrigo Nogueira
,
R. Lotufo
,
R. C. Machado
IEEE Transactions on Information Forensics and…
2016
Corpus ID: 14543254
With the growing use of biometric authentication systems in the recent years, spoof fingerprint detection has become increasingly…
Expand
Highly Cited
2015
Highly Cited
2015
The Bitcoin Backbone Protocol: Analysis and Applications
J. Garay
,
A. Kiayias
,
Nikos Leonardos
International Conference on the Theory and…
2015
Corpus ID: 2746042
Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the…
Expand
Highly Cited
2010
Highly Cited
2010
Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model
Xiaoyang Tan
,
Yi Li
,
Jun Liu
,
Lin Jiang
European Conference on Computer Vision
2010
Corpus ID: 14126228
Spoofing with photograph or video is one of the most common manner to circumvent a face recognition system. In this paper, we…
Expand
Highly Cited
2005
Highly Cited
2005
Live migration of virtual machines
Christopher Clark
,
K. Fraser
,
+5 authors
A. Warfield
Symposium on Networked Systems Design and…
2005
Corpus ID: 2705898
Migrating operating system instances across distinct physical hosts is a useful tool for administrators of data centers and…
Expand
Highly Cited
2005
Highly Cited
2005
Recognizing safety and liveness
B. Alpern
,
F. Schneider
Distributed computing
2005
Corpus ID: 9717112
A formal characterization for safety properties and liveness properties is given in terms of the structure of the Buchi automaton…
Expand
Highly Cited
2005
Highly Cited
2005
Adopt: asynchronous distributed constraint optimization with quality guarantees
Pragnesh Jay Modi
,
Wei-Min Shen
,
Milind Tambe
,
M. Yokoo
Artificial Intelligence
2005
Corpus ID: 1428507
Highly Cited
2004
Highly Cited
2004
Biometric cryptosystems: issues and challenges
U. Uludag
,
Sharath Pankanti
,
S. Prabhakar
,
Anil K. Jain
Proceedings of the IEEE
2004
Corpus ID: 18330000
In traditional cryptosystems, user authentication is based on possession of secret keys; the method falls apart if the keys are…
Expand
Highly Cited
1988
Highly Cited
1988
The existence of refinement mappings
M. Abadi
,
L. Lamport
[] Proceedings. Third Annual Information…
1988
Corpus ID: 7927308
Highly Cited
1984
Highly Cited
1984
Defining Liveness
B. Alpern
,
F. Schneider
Information Processing Letters
1984
Corpus ID: 8707490
Highly Cited
1982
Highly Cited
1982
Proving Liveness Properties of Concurrent Programs
S. Owicki
,
L. Lamport
TOPL
1982
Corpus ID: 17838416
A liveness property asserts that program execution eventually reaches some desirable state. While termination has been studied…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE