Sciweavers

1058 search results - page 42 / 212
» It's Doomed; We Can Prove It
Sort
View
AAECC
2005
Springer
128views Algorithms» more  AAECC 2005»
13 years 9 months ago
The size-change principle and dependency pairs for termination of term rewriting
Abstract In [24], a new size-change principle was proposed to verify termination of functional programs automatically. We extend this principle in order to prove termination and in...
René Thiemann, Jürgen Giesl
CP
2000
Springer
14 years 2 months ago
Constraint Propagation for Soft Constraints: Generalization and Termination Conditions
Soft constraints based on semirings are a generalization of classical constraints, where tuples of variables' values in each soft constraint are uniquely associated to element...
Stefano Bistarelli, Rosella Gennari, Francesca Ros...
ISPD
1998
ACM
101views Hardware» more  ISPD 1998»
14 years 2 months ago
Greedy wire-sizing is linear time
—The greedy wire-sizing algorithm (GWSA) has been experimentally shown to be very efficient, but no mathematical analysis on its convergence rate has ever been reported. In this...
Chris C. N. Chu, D. F. Wong
CRYPTO
2006
Springer
92views Cryptology» more  CRYPTO 2006»
14 years 1 months ago
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
In this paper we formalize a general model of cryptanalytic time/memory tradeoffs for the inversion of a random function f : {0, 1, . . . , N - 1} {0, 1, . . . , N - 1}. The model...
Elad Barkan, Eli Biham, Adi Shamir
JAR
2006
103views more  JAR 2006»
13 years 10 months ago
A Framework for Verifying Bit-Level Pipelined Machines Based on Automated Deduction and Decision Procedures
We describe an approach to verifying bit-level pipelined machine models using a combination of deductive reasoning and decision procedures. While theorem proving systems such as AC...
Panagiotis Manolios, Sudarshan K. Srinivasan