Sciweavers

3228 search results - page 347 / 646
» Computationally Sound Proofs
Sort
View
ANTS
2004
Springer
149views Algorithms» more  ANTS 2004»
15 years 9 months ago
A Binary Recursive Gcd Algorithm
The binary algorithm is a variant of the Euclidean algorithm that performs well in practice. We present a quasi-linear time recursive algorithm that computes the greatest common di...
Damien Stehlé, Paul Zimmermann
JELIA
2004
Springer
15 years 9 months ago
Explaining Subsumption by Optimal Interpolation
We describe ongoing research to support the construction of terminologies with Description Logics. For the explanation of subsumption we search for particular concepts because of t...
Stefan Schlobach
COCO
2003
Springer
118views Algorithms» more  COCO 2003»
15 years 9 months ago
Lower bounds for predecessor searching in the cell probe model
We consider a fundamental problem in data structures, static predecessor searching: Given a subset S of size n from the universe [m], store S so that queries of the form “What i...
Pranab Sen
CRYPTO
2003
Springer
105views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
On Memory-Bound Functions for Fighting Spam
In 1992, Dwork and Naor proposed that e-mail messages be accompanied by easy-to-check proofs of computational effort in order to discourage junk e-mail, now known as spam. They pro...
Cynthia Dwork, Andrew Goldberg, Moni Naor
FCT
2003
Springer
15 years 9 months ago
Context-Sensitive Equivalences for Non-interference Based Protocol Analysis
We develop new proof techniques, based on non-interference, for the analysis of safety and liveness properties of cryptographic protocols expressed as terms of the process algebra ...
Michele Bugliesi, Ambra Ceccato, Sabina Rossi