Sciweavers

915 search results - page 98 / 183
» Proof labeling schemes
Sort
View
IAT
2009
IEEE
13 years 11 months ago
On the Acceptability of Meta-arguments
In this paper we introduce a theory of meta-argumentation, by using Dung’s theory of abstract argumentation to reason about itself. Metaarguments are generated from atomic argum...
Guido Boella, Leendert van der Torre, Serena Villa...
JNS
2007
63views more  JNS 2007»
13 years 8 months ago
Finite-Gap Solutions of the Vortex Filament Equation: Isoperiodic Deformations
We study the topology of quasiperiodic solutions of the vortex filament equation in a neighborhood of multiply covered circles. We construct these solutions by means of a sequence...
A. Calini, T. Ivey
PKC
1999
Springer
125views Cryptology» more  PKC 1999»
14 years 10 days ago
Anonymous Fingerprinting Based on Committed Oblivious Transfer
Abstract. Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared a...
Josep Domingo-Ferrer
COCO
1993
Springer
133views Algorithms» more  COCO 1993»
14 years 5 days ago
On Span Programs
We introduce a linear algebraic model of computation, the Span Program, and prove several upper and lower bounds on it. These results yield the following applications in complexit...
Mauricio Karchmer, Avi Wigderson
ITP
2010
137views Mathematics» more  ITP 2010»
13 years 12 months ago
Importing HOL Light into Coq
Abstract. We present a new scheme to translate mathematical developments from HOL Light to Coq, where they can be re-used and rechecked. By relying on a carefully chosen embedding ...
Chantal Keller, Benjamin Werner