Sciweavers

154 search results - page 24 / 31
» Computing universal models under guarded TGDs
Sort
View
ENTCS
2007
121views more  ENTCS 2007»
13 years 9 months ago
Dagger Compact Closed Categories and Completely Positive Maps: (Extended Abstract)
ly positive maps (extended abstract) Peter Selinger 1 Department of Mathematics and Statistics Dalhousie University, Halifax, Nova Scotia, Canada Dagger compact closed categories ...
Peter Selinger
RAS
2000
144views more  RAS 2000»
13 years 9 months ago
Robot navigation in the real world: : Experiments with Manchester's FortyTwo in unmodified, large environments
Mobile robot navigation under controlled laboratory conditions is, by now, state of the art and reliably achievable. To transfer navigation mechanisms used in such small-scale env...
Ulrich Nehmzow, Carl Owen
PAIRING
2010
Springer
116views Cryptology» more  PAIRING 2010»
13 years 8 months ago
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
Lewko and Waters [Eurocrypt 2010] presented a fully secure HIBE with short ciphertexts. In this paper we show how to modify their construction to achieve anonymity. We prove the s...
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
CCS
2008
ACM
13 years 11 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
PODS
2008
ACM
178views Database» more  PODS 2008»
14 years 10 months ago
The chase revisited
We revisit the classical chase procedure, studying its properties as well as its applicability to standard database problems. We settle (in the negative) the open problem of decid...
Alin Deutsch, Alan Nash, Jeffrey B. Remmel