Sciweavers

2436 search results - page 99 / 488
» Comonadic Notions of Computation
Sort
View
112
Voted
TCC
2010
Springer
324views Cryptology» more  TCC 2010»
16 years 23 days ago
Leakage-Resilient Signatures
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insufficient due to ...
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, G...
156
Voted
STACS
2009
Springer
15 years 10 months ago
Forward Analysis for WSTS, Part I: Completions
Well-structured transition systems provide the right foundation to compute a finite basis of the set of predecessors of the upward closure of a state. The dual problem, to compute...
Alain Finkel, Jean Goubault-Larrecq
133
Voted
SAC
2008
ACM
15 years 3 months ago
Template design and automatic generation of controllers for industrial robots
The basic theory of supervisory control of discrete-event systems is extended with the notion of templates, which simplifies the modeling of controllers since one can work with co...
Lenko Grigorov, Karen Rudie, José E. R. Cur...
OOPSLA
2010
Springer
15 years 2 months ago
Programming with time: cyber-physical programming with impromptu
The act of computer programming is generally considered to be temporally removed from a computer program’s execution. In this paper we discuss the idea of programming as an acti...
Andrew Sorensen, Henry Gardner
ICDE
2007
IEEE
124views Database» more  ICDE 2007»
16 years 5 months ago
Topology Search over Biological Databases
We introduce the notion of a data topology and the problem of topology search over databases. A data topology summarizes the set of all possible relationships that connect a given...
Lin Guo, Jayavel Shanmugasundaram, Golan Yona