Sciweavers

331 search results - page 45 / 67
» Quantified coalition logic
Sort
View
JOC
2010
123views more  JOC 2010»
13 years 3 months ago
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Abstract. In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computati...
Yonatan Aumann, Yehuda Lindell
LOGCOM
2002
72views more  LOGCOM 2002»
13 years 8 months ago
Definability in Rationals with Real Order in the Background
The paper deals with logically definable families of sets (or point-sets) of rational numbers. In particular we are interested whether the families definable over the real line wi...
Yuri Gurevich, Alexander Moshe Rabinovich
ICCAD
1995
IEEE
88views Hardware» more  ICCAD 1995»
14 years 10 days ago
Estimation and bounding of energy consumption in burst-mode control circuits
This paper describes two techniques to quantify energy consumption of burst-modeasynchronous(clock-less)controlcircuits. The circuit specifications consideredare extended burst-m...
Peter A. Beerel, Kenneth Y. Yun, Steven M. Nowick,...
SWWS
2008
13 years 10 months ago
Metrics for Evaluating the Semantic Implications of Changes in Evolving Ontologies
We propose a set of metrics for measuring the semantic implications of changes during ontology evolution. Our metrics focus on the changes of classes and associated axioms or annot...
Chuming Chen, Manton M. Matthews
BIRTHDAY
2010
Springer
13 years 10 months ago
Finding Reductions Automatically
Abstract. We describe our progress building the program ReductionFinder, which uses off-the-shelf SAT solvers together with the Cmodels system to automatically search for reduction...
Michael Crouch, Neil Immerman, J. Eliot B. Moss