Sciweavers

2610 search results - page 43 / 522
» Computational Probabilistic Non-interference
Sort
View
JOC
2007
125views more  JOC 2007»
13 years 8 months ago
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring
Abstract. We address one of the most fundamental problems concerning the RSA cryptosystem: does the knowledge of the RSA public and secret key-pair (e, d) yield the factorization o...
Jean-Sébastien Coron, Alexander May
RTA
2005
Springer
14 years 2 months ago
Proving Positive Almost-Sure Termination
Abstract In order to extend the modeling capabilities of rewriting systems, it is rather natural to consider that the firing of rules can be subject to some probabilistic laws. Co...
Olivier Bournez, Florent Garnier
CONCUR
2003
Springer
14 years 2 months ago
Compositionality for Probabilistic Automata
We establish that on the domain of probabilistic automata, the trace distribution precongruence coincides with the simulation preorder.
Nancy A. Lynch, Roberto Segala, Frits W. Vaandrage...
KDD
2009
ACM
193views Data Mining» more  KDD 2009»
14 years 9 months ago
Probabilistic frequent itemset mining in uncertain databases
Probabilistic frequent itemset mining in uncertain transaction databases semantically and computationally differs from traditional techniques applied to standard "certain&quo...
Andreas Züfle, Florian Verhein, Hans-Peter Kr...