Sciweavers

1615 search results - page 45 / 323
» Computer science and decision theory
Sort
View
TLCA
2009
Springer
14 years 2 months ago
Some Observations on the Proof Theory of Second Order Propositional Multiplicative Linear Logic
Abstract. We investigate the question of what constitutes a proof when quantifiers and multiplicative units are both present. On the technical level this paper provides two new as...
Lutz Straßburger
MFCS
2010
Springer
13 years 6 months ago
A dexptime-Complete Dolev-Yao Theory with Distributive Encryption
In the context of modelling cryptographic tools like blind signatures and homomorphic encryption, the DolevYao model is typically extended with an operator over which encryption i...
Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh
FOCS
2008
IEEE
14 years 2 months ago
Sketching and Streaming Entropy via Approximation Theory
We give near-optimal sketching and streaming algorithms for estimating Shannon entropy in the most general streaming model, with arbitrary insertions and deletions. This improves ...
Nicholas J. A. Harvey, Jelani Nelson, Krzysztof On...
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
14 years 2 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
ICTCS
2003
Springer
14 years 26 days ago
Algebraic Theories for Contextual Pre-nets
The algebraic models of computation for contextual nets that have been proposed in the literature either rely on a non-free monoid of objects, or introduce too many fictitious beh...
Roberto Bruni, José Meseguer, Ugo Montanari...