Sciweavers

1058 search results - page 18 / 212
» It's Doomed; We Can Prove It
Sort
View
FMCO
2004
Springer
14 years 3 months ago
Games with Secure Equilibria
In 2-player non-zero-sum games, Nash equilibria capture the options for rational behavior if each player attempts to maximize her payoff. In contrast to classical game theory, we ...
Krishnendu Chatterjee, Thomas A. Henzinger, Marcin...
CRYPTO
2012
Springer
217views Cryptology» more  CRYPTO 2012»
12 years 8 days ago
Securing Circuits against Constant-Rate Tampering
We present a compiler that converts any circuit into one that remains secure even if a constant fraction of its wires are tampered with. Following the seminal work of Ishai et al. ...
Dana Dachman-Soled, Yael Tauman Kalai
WSC
2000
13 years 11 months ago
Ensuring the successful adoption of discrete event simulation in a manufacturing environment
Discrete event simulation has long been recognized as a valuable tool for manufacturers, but converting the recognition of value into an embrace of the technology can be a challen...
J. Michael Knoll, Joseph A. Heim
LATIN
2004
Springer
14 years 3 months ago
A Proof System and a Decision Procedure for Equality Logic
Equality logic with or without uninterpreted functions is used for proving the equivalence or refinement between systems (hardware verification, compiler’s translation, etc). C...
Olga Tveretina, Hans Zantema
COCOON
2005
Springer
14 years 3 months ago
Complexity and Approximation of Satisfactory Partition Problems
The Satisfactory Partition problem consists of deciding if a given graph has a partition of its vertex set into two nonempty parts such that each vertex has at least as many neighb...
Cristina Bazgan, Zsolt Tuza, Daniel Vanderpooten