Sciweavers

989 search results - page 139 / 198
» Pebbling and Proofs of Work
Sort
View
LICS
1999
IEEE
14 years 8 days ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
FSTTCS
1999
Springer
14 years 8 days ago
Hoare Logic for Mutual Recursion and Local Variables
We present a (the rst?) sound and relatively complete Hoare logic for a simple imperative programming language including mutually recursive procedures with call-by-value parameters...
David von Oheimb
FOCS
1998
IEEE
14 years 8 days ago
A Linguistic Characterization of Bounded Oracle Computation and Probabilistic Polynomial Time
We present a higher-order functional notation for polynomial-time computation with arbitrary 0; 1-valued oracle. This provides a linguistic characterization for classes such as np...
John C. Mitchell, Mark Mitchell, Andre Scedrov
B
1998
Springer
14 years 7 days ago
Introducing Dynamic Constraints in B
In B, the expression of dynamic constraints is notoriously missing. In this paper, we make various proposals for introducing them. They all express, in di erent complementary ways,...
Jean-Raymond Abrial, Louis Mussat
COLT
1998
Springer
14 years 7 days ago
Robust Learning Aided by Context
Empirical studies of multitask learning provide some evidence that the performance of a learning system on its intended targets improves by presenting to the learning system relat...
John Case, Sanjay Jain, Matthias Ott, Arun Sharma,...