Sciweavers

1818 search results - page 203 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
117
Voted
RTSS
1999
IEEE
15 years 8 months ago
On the Use of Formal Techniques for Analyzing Dependable Real-Time Protocols
The e ective design of composite dependable and real-time protocols entails demonstrating their proof of correctness and, in practice, the e cient delivery of services. We focus o...
Purnendu Sinha, Neeraj Suri
157
Voted
FSTTCS
1999
Springer
15 years 8 months ago
Hoare Logic for Mutual Recursion and Local Variables
We present a (the rst?) sound and relatively complete Hoare logic for a simple imperative programming language including mutually recursive procedures with call-by-value parameters...
David von Oheimb
138
Voted
ICLP
1999
Springer
15 years 8 months ago
Bounded Nondeterminism of Logic Programs
We introduce the notion of bounded nondeterminism for logic programs and queries. A program and a query have bounded nondeterminism if there are finitely many refutations for the...
Dino Pedreschi, Salvatore Ruggieri
135
Voted
FOCS
1998
IEEE
15 years 8 months ago
A Linguistic Characterization of Bounded Oracle Computation and Probabilistic Polynomial Time
We present a higher-order functional notation for polynomial-time computation with arbitrary 0; 1-valued oracle. This provides a linguistic characterization for classes such as np...
John C. Mitchell, Mark Mitchell, Andre Scedrov
110
Voted
ICMCS
1998
IEEE
82views Multimedia» more  ICMCS 1998»
15 years 8 months ago
Watermarking Methods for MPEG Encoded Video: Towards Resolving Rightful Ownership
Various digital watermarking techniques have been proposed in recent years as the methods to protect the copyright of multimedia data. However, as pointed out by the IBM research ...
Lintian Qiao, Klara Nahrstedt