Sciweavers

2138 search results - page 369 / 428
» Logical Step-Indexed Logical Relations
Sort
View
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
15 years 10 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani
TLCA
2007
Springer
15 years 10 months ago
Computation by Prophecy
We describe a new method to represent (partial) recursive functions in type theory. For every recursive definition, we define a co-inductive type of prophecies that characterises...
Ana Bove, Venanzio Capretta
ANSS
2006
IEEE
15 years 10 months ago
An Integrative Modelling Approach for Simulation and Analysis of Adaptive Agents
To simulate adaptive agents with abilities matching those of their real-world counterparts, a natural approach is to incorporate adaptation mechanisms such as classical conditioni...
Tibor Bosse, Catholijn M. Jonker, Jan Treur
ICNP
2006
IEEE
15 years 10 months ago
Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL
— This paper reports on an experiment in network protocol design: we use novel rigorous techniques in the design process of a new protocol, in a close collaboration between syste...
Adam Biltcliffe, Michael Dales, Sam Jansen, Tom Ri...
IJCNN
2006
IEEE
15 years 10 months ago
Combining Multi-Frame Images for Enhancement Using Self-Delaying Dynamic Networks
Abstract— This paper presents the use of a newly created network structure known as a Self-Delaying Dynamic Network (SDN). The SDNs were created to process data which varies with...
Lewis Eric Hibell, Honghai Liu, David J. Brown