Sciweavers

691 search results - page 67 / 139
» Automatically Proving Linearizability
Sort
View
CSFW
2009
IEEE
14 years 4 months ago
Achieving Security Despite Compromise Using Zero-knowledge
One of the important challenges when designing and analyzing cryptographic protocols is the enforcement of security properties in the presence of compromised participants. This pa...
Michael Backes, Martin P. Grochulla, Catalin Hritc...
ACG
2009
Springer
14 years 4 months ago
Deriving Concepts and Strategies from Chess Tablebases
Abstract. Complete tablebases, indicating best moves for every position, exist for chess endgames. There is no doubt that tablebases contain a wealth of knowledge, however, mining ...
Matej Guid, Martin Mozina, Aleksander Sadikov, Iva...
QEST
2007
IEEE
14 years 4 months ago
Probabilistic Model Checking Modulo Theories
— Probabilistic models are widely used to analyze embedded, networked, and more recently biological systems. Existing numerical analysis techniques are limited to finitestate mo...
Björn Wachter, Lijun Zhang, Holger Hermanns
CALCO
2007
Springer
100views Mathematics» more  CALCO 2007»
14 years 4 months ago
Applications of Metric Coinduction
Metric coinduction is a form of coinduction that can be used to establish properties of objects constructed as a limit of finite approximations. One can prove a coinduction step s...
Dexter Kozen, Nicholas Ruozzi
ECTEL
2007
Springer
14 years 4 months ago
Writing to be read - Readability Indices for Open Educational Resources
Much of the text of pen resources such as Wikipedia is written at a college level of readability, thus posing an access barrier to the general public. Reading levels are important ...
Griff Richards