Sciweavers

133 search results - page 22 / 27
» Proving Properties for Behavioural Specifications with Term ...
Sort
View
CRYPTO
2005
Springer
171views Cryptology» more  CRYPTO 2005»
14 years 4 months ago
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Error correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, we study the connections between codes, matroids, and a s...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
SIGDOC
2005
ACM
14 years 4 months ago
User-centred design and evaluation of ubiquitous services
Theoretical and technological progress has revived the interest in the design of services for the support of co-located human-human communication and collaboration, witnessing the...
Rahat Iqbal, Janienke Sturm, Olga A. Kulyk, Jimmy ...
JACM
2002
163views more  JACM 2002»
13 years 10 months ago
Formal verification of standards for distance vector routing protocols
We show how to use an interactive theorem prover, HOL, together with a model checker, SPIN, to prove key properties of distance vector routing protocols. We do three case studies: ...
Karthikeyan Bhargavan, Davor Obradovic, Carl A. Gu...
WWW
2008
ACM
14 years 11 months ago
Analysis of geographic queries in a search engine log
Geography is becoming increasingly important in web search. Search engines can often return better results to users by analyzing features such as user location or geographic terms...
Qingqing Gan, Josh Attenberg, Alexander Markowetz,...
BIRTHDAY
2010
Springer
13 years 12 months ago
Choiceless Computation and Symmetry
Many natural problems in computer science concern structures like graphs where elements are not inherently ordered. In contrast, Turing machines and other common models of computa...
Benjamin Rossman