Sciweavers

1094 search results - page 147 / 219
» On Computing Explanations in Argumentation
Sort
View
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
14 years 5 months ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...
LICS
2009
IEEE
14 years 5 months ago
An Algebra for Kripke Polynomial Coalgebras
Several dynamical systems, such as deterministic automata and labelled transition systems, can be described as coalgebras of so-called Kripke polynomial functors, built up from co...
Marcello M. Bonsangue, Jan J. M. M. Rutten, Alexan...
WOLLIC
2009
Springer
14 years 5 months ago
Sound and Complete Tree-Sequent Calculus for Inquisitive Logic
Abstract. We introduce a tree-sequent calculus for inquisitive logic (Groenendijk 2008) as a special form of labelled deductive system (Gabbay 1996). In particular, we establish th...
Katsuhiko Sano
DALT
2009
Springer
14 years 5 months ago
Reasoning and Planning with Cooperative Actions for Multiagents Using Answer Set Programming
In this paper, we investigate the multiagent planning problem in the presence of cooperative actions and agents, which have their own goals and are willing to cooperate. To this en...
Tran Cao Son, Chiaki Sakama
IWOCA
2009
Springer
152views Algorithms» more  IWOCA 2009»
14 years 5 months ago
Better Polynomial Algorithms on Graphs of Bounded Rank-Width
Abstract. Although there exist many polynomial algorithms for NPhard problems running on a bounded clique-width expression of the input graph, there exists only little comparable w...
Robert Ganian, Petr Hlinený