Sciweavers

391 search results - page 64 / 79
» Formal Universes
Sort
View
135
Voted
ICFP
2010
ACM
15 years 4 months ago
Bidirectionalizing graph transformations
Bidirectional transformations provide a novel mechanism for synchronizing and maintaining the consistency of information between input and output. Despite many promising results o...
Soichiro Hidaka, Zhenjiang Hu, Kazuhiro Inaba, Hir...
133
Voted
JUCS
2008
113views more  JUCS 2008»
15 years 3 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
TIT
2008
90views more  TIT 2008»
15 years 3 months ago
Scanning and Sequential Decision Making for Multidimensional Data - Part II: The Noisy Case
We consider the problem of sequential decision making for random fields corrupted by noise. In this scenario, the decision maker observes a noisy version of the data, yet judged wi...
Asaf Cohen, Tsachy Weissman, Neri Merhav
MANSCI
2007
88views more  MANSCI 2007»
15 years 3 months ago
The Timing of Resource Development and Sustainable Competitive Advantage
We develop a formal model of the timing of resource development by competing …rms. Our aim is to deepen and extend resource-level theorizing about sustainable competitive advant...
Gonçalo Pacheco-de-Almeida, Peter Zemsky
231
Voted
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
14 years 7 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...