Sciweavers

1076 search results - page 30 / 216
» Operations on proofs and labels
Sort
View
FSE
2003
Springer
123views Cryptology» more  FSE 2003»
14 years 24 days ago
The Security of "One-Block-to-Many" Modes of Operation
In this paper, we investigate the security, in the Luby-Rackoff security paradigm, of blockcipher modes of operation allowing to expand a one-block input into a longer t-block ou...
Henri Gilbert
ADCM
2011
13 years 2 months ago
Perturbed preconditioned inverse iteration for operator eigenvalue problems with applications to adaptive wavelet discretization
ABSTRACT. In this paper we discuss an abstract iteration scheme for the calculation of the smallest eigenvalue of an elliptic operator eigenvalue problem. A short and geometric pro...
Thorsten Rohwedder, Reinhold Schneider, Andreas Ze...
EMNLP
2006
13 years 9 months ago
Entity Annotation based on Inverse Index Operations
Entity annotation involves attaching a label such as `name' or `organization' to a sequence of tokens in a document. All the current rule-based and machine learningbased...
Ganesh Ramakrishnan, Sreeram Balakrishnan, Sachind...
SOSYM
2002
123views more  SOSYM 2002»
13 years 7 months ago
A structured operational semantics for UML-statecharts
The Unified Modeling Language (UML) has gained wide acceptance in very short time because of its variety of well-known and intuitive graphical notations. However, this comes at the...
Michael von der Beeck
POPL
2010
ACM
14 years 5 months ago
A Verified Compiler for an Impure Functional Language
We present a verified compiler to an idealized assembly language from a small, untyped functional language with mutable references and exceptions. The compiler is programmed in th...
Adam J. Chlipala