Sciweavers

1818 search results - page 35 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 8 months ago
Classical BI: Its Semantics and Proof Theory
We present Classical BI (CBI), a new addition to the family of bunched logics which originates in O'Hearn and Pym's logic of bunched implications BI. CBI differs from exi...
James Brotherston, Cristiano Calcagno
JCM
2008
77views more  JCM 2008»
13 years 8 months ago
In-Field Attack Proof of Injected False Data in Sensor Networks
In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detec...
Zheng Wang, Xiaodong Lee, Xinchang Zhang, Baoping ...
CORR
1999
Springer
138views Education» more  CORR 1999»
13 years 8 months ago
A simple proof of the unconditional security of quantum key distribution
Quantum key distribution is the best known application of quantum cryptography. Previously proposed proofs of security of quantum key distribution contain various technical subtle...
Hoi-Kwong Lo
ACNS
2007
Springer
96views Cryptology» more  ACNS 2007»
14 years 23 days ago
Universal Accumulators with Efficient Nonmembership Proofs
Based on the notion of accumulators, we propose a new cryptographic scheme called universal accumulators. This scheme enables one to commit to a set of values using a short accumul...
Jiangtao Li, Ninghui Li, Rui Xue
CG
2006
Springer
14 years 15 days ago
Monte-Carlo Proof-Number Search for Computer Go
In the last decade, proof-number search and Monte-Carlo methods have successfully been applied to the combinatorial-games domain. Proof-number search is a reliable algorithm. It re...
Jahn-Takeshi Saito, Guillaume Chaslot, Jos W. H. M...