Sciweavers

285 search results - page 55 / 57
» Game Semantics and Subtyping
Sort
View
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
15 years 1 months ago
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Michael Backes, Matteo Maffei, Dominique Unruh
PKDD
2010
Springer
128views Data Mining» more  PKDD 2010»
15 years 1 months ago
Learning to Tag from Open Vocabulary Labels
Most approaches to classifying media content assume a fixed, closed vocabulary of labels. In contrast, we advocate machine learning approaches which take advantage of the millions...
Edith Law, Burr Settles, Tom M. Mitchell
AI
2011
Springer
14 years 10 months ago
First-order logical filtering
Logical filtering is the process of updating a belief state (set of possible world states) after a sequence of executed actions and perceived observations. In general, it is intr...
Afsaneh Shirazi, Eyal Amir
SOSP
2003
ACM
15 years 12 months ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...
CSL
2007
Springer
15 years 9 months ago
From Proofs to Focused Proofs: A Modular Proof of Focalization in Linear Logic
Abstract. Probably the most significant result concerning cut-free sequent calculus proofs in linear logic is the completeness of focused proofs. This completeness theorem has a n...
Dale Miller, Alexis Saurin