Sciweavers

505 search results - page 54 / 101
» Approximate databases: a support tool for approximate reason...
Sort
View
CAV
2009
Springer
150views Hardware» more  CAV 2009»
14 years 8 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
IPPS
2006
IEEE
14 years 1 months ago
Neighbourhood maps: decentralised ranking in small-world P2P networks
Reputation in P2P networks is an important tool to encourage cooperation among peers. It is based on ranking of peers according to their past behaviour. In large-scale real world ...
Matteo Dell'Amico
LOPSTR
2005
Springer
14 years 1 months ago
An Algorithm for Local Variable Elimination in Normal Logic Programs
A variable is local if it occurs in a clause body but not in its head. Local variables appear naturally in practical logic programming, but they complicate several aspects such as ...
Javier Álvez, Paqui Lucio
CRYPTO
2004
Springer
79views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
Abstract. In this paper, we study the existence of multicollisions in iterated hash functions. We show that finding multicollisions, i.e. r-tuples of messages that all hash to the...
Antoine Joux
EUSFLAT
2007
170views Fuzzy Logic» more  EUSFLAT 2007»
13 years 9 months ago
Inverse Arithmetic Operators for Fuzzy Intervals
Fuzzy arithmetic is a powerful tool in many engineering problems such as decision making, control theory, fuzzy systems and approximate reasoning. However, it is well known that t...
Reda Boukezzoula, Sylvie Galichet, Laurent Foulloy