Sciweavers

915 search results - page 56 / 183
» Proof labeling schemes
Sort
View
ACL2
2006
ACM
14 years 1 months ago
Soundness of the simply typed lambda calculus in ACL2
To make it practical to mechanize proofs in programming language metatheory, several capabilities are required of the theorem proving framework. One must be able to represent and ...
Sol Swords, William R. Cook
DCC
2010
IEEE
13 years 8 months ago
Practical unconditionally secure two-channel message authentication
We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. We look at both noninteractive message authentication ...
Atefeh Mashatan, Douglas R. Stinson
MCS
2005
Springer
14 years 1 months ago
Mixture of Gaussian Processes for Combining Multiple Modalities
This paper describes a unified approach, based on Gaussian Processes, for achieving sensor fusion under the problematic conditions of missing channels and noisy labels. Under the ...
Ashish Kapoor, Hyungil Ahn, Rosalind W. Picard
ADHOCNETS
2009
Springer
13 years 5 months ago
Compressing MAC Headers on Shared Wireless Media
This paper presents a header compression algorithm that unlike previous protocols is capable of compressing MAC headers in a multiple-access (shared) channel. Previous schemes coul...
Jesus Arango, Matthew Faulkner, Stephen Pink
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 7 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks