Sciweavers

1818 search results - page 269 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
122
Voted
TACAS
2009
Springer
99views Algorithms» more  TACAS 2009»
15 years 10 months ago
Ground Interpolation for the Theory of Equality
Abstract. Given a theory T and two formulas A and B jointly unsatisfiable in T , a theory interpolant of A and B is a formula I such that (i) its non-theory symbols are shared by ...
Alexander Fuchs, Amit Goel, Jim Grundy, Sava Krsti...
114
Voted
FOCS
2009
IEEE
15 years 10 months ago
Higher Eigenvalues of Graphs
— We present a general method for proving upper bounds on the eigenvalues of the graph Laplacian. In particular, we show that for any positive integer k, the kth smallest eigenva...
Jonathan A. Kelner, James R. Lee, Gregory N. Price...
174
Voted
ICASSP
2009
IEEE
15 years 10 months ago
A scale transform based method for rhythmic similarity of music
This paper introduces scale transforms to measure rhythmic similarity between two musical pieces. The rhythm of a piece of music is described by the scale transform magnitude, com...
Andre Holzapfel, Yannis Stylianou
SP
2009
IEEE
122views Security Privacy» more  SP 2009»
15 years 10 months ago
Plaintext Recovery Attacks against SSH
This paper presents a variety of plaintext-recovering attacks against SSH. We implemented a proof of concept of our attacks against OpenSSH, where we can verifiably recover 14 bi...
Martin R. Albrecht, Kenneth G. Paterson, Gaven J. ...
122
Voted
WMCSA
2009
IEEE
15 years 10 months ago
We saw each other on the subway: secure, anonymous proximity-based missed connections
There is an inherent tension between the value provided by Location-Based Services (LBSs) and the location-privacy concerns they raise. Unfortunately, users are often forced to ei...
Justin Manweiler, Ryan Scudellari, Zachary Cancio,...