Microsoft Research Blog

English

  1. Designing a Global Name Service 

    August 1, 1986 | Butler Lampson

    A name service maps a name of an individual, organization or facility into a set of labeled properties, each of which is a string. It is the basis for resource location, mail addressing, and authentication in a distributed computing system. The global name service described…

  2. Definability by Constant-depth Polynomial-size Circuits 

    April 8, 1986 | L. Denenberg, Yuri Gurevich, and S. Shelah

    We investigate the expressive power of constant-depth polynomial-size circuit models. In particular, we construct a circuit model whose expressive power is precisely that of first-order logic.

  3. What does O(n) mean? 

    April 7, 1986 | Yuri Gurevich

    In "Crusade for Better Notation" [1], Gilles Brassard calls one-way equations involving big omicron, big omega, etc. "bad, irrational and confusing notation". He promotes the following alternative that seems to him better and more natural: define O(t(n)), Ω (t(n)), etc. as sets and "use them…

  4. Henkin Quantifiers and Complete Problems 

    April 7, 1986 | Andreas Blass and Yuri Gurevich

    We show that almost any non-linear quantifier, applied to quantifier-free first-order formulas, suffices to express an NP- complete predicate; the remaining non-linear quantifiers express exactly co-NL predicates (NL is Nondeterministic Log-space).

  5. A Global Authentication Service without Global Trust 

    April 1, 1986 | Andrew Birrell, Butler Lampson, Roger Needham, and Mike Schroeder

    This paper describes a design for an authentication service for a very large scale, very long lifetime, distributed system. The paper introduces a methodology for describing authentication protocols that makes explicit the trust relationships amongst the participants. The authentication protocol is based on the primitive…

  6. Toward a Science of Expert Systems 

    March 1, 1986 | Eric Horvitz

    Over the last several years, teams working on expert systems have been exploring formal approaches for belief revision and information acquisition. The formalization of major components of expert systems operation is useful for understanding and characterizing system behavior and for predicting changes with modification. Formalization…

  7. Parsing distfix operators 

    February 1, 1986 | Simon Peyton Jones

    The advantages of user-defined distfix operators – a syntactic convenience that enhances the readability of programs – can be obtained as an extension of almost any programming language without requiring dynamic changes to the parser.

  8. Current work on authentication 

    January 1, 1986 | Andrew Birrell, Butler Lampson, Roger M. Needham, and Mike Schroeder

    We have been working on a design for an authentication service for a distributed system. The design has three goals that we fed have not been met simultaneously by any previous design. First, the service must be able to grow to cover an arbitrarily large…