Sciweavers

216 search results - page 4 / 44
» Additive envelopes of continuous functions
Sort
View
ASIACRYPT
2009
Springer
14 years 2 months ago
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
The design of cryptographic hash functions is a very complex and failure-prone process. For this reason, this paper puts forward a completely modular and fault-tolerant approach to...
Anja Lehmann, Stefano Tessaro
PEPM
2011
ACM
12 years 10 months ago
Ordering multiple continuations on the stack
Passing multiple continuation arguments to a function in CPS form allows one to encode a wide variety of direct-style control constructs, such as conditionals, exceptions, and mul...
Dimitrios Vardoulakis, Olin Shivers
ICAISC
2010
Springer
14 years 11 days ago
On the Distributivity of Fuzzy Implications over Continuous Archimedean Triangular Norms
Recently, the distributivity of fuzzy implications over t-norms, t-conorms and uninorms was studied in many articles. In this paper we characterize functions which satisfy one of ...
Michal Baczynski
ENTCS
2007
107views more  ENTCS 2007»
13 years 7 months ago
Event Domains, Stable Functions and Proof-Nets
We pursue the program of exposing the intrinsic mathematical structure of the “space of proofs” of a logical system [AJ94b]. We study the case of Multiplicative-Additive Linea...
Samson Abramsky
VLDB
2010
ACM
190views Database» more  VLDB 2010»
13 years 6 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias