Sciweavers

1786 search results - page 58 / 358
» The Structure of Factor Oracles
Sort
View
CADE
2007
Springer
16 years 4 months ago
A Termination Checker for Isabelle Hoare Logic
Abstract. Hoare logic is widely used for software specification and verification. Frequently we need to prove the total correctness of a program: to prove that the program not only...
Jia Meng, Lawrence C. Paulson, Gerwin Klein
FOCS
2007
IEEE
15 years 10 months ago
Planning for Fast Connectivity Updates
Understanding how a single edge deletion can affect the connectivity of a graph amounts to finding the graph bridges. But when faced with d > 1 deletions, can we establish as ...
Mihai Patrascu, Mikkel Thorup
SIGMOD
2005
ACM
133views Database» more  SIGMOD 2005»
15 years 10 months ago
XML and relational database management systems: the inside story
As XML has evolved from a document markup language to a widely-used format for exchange of structured and semistructured data, managing large amounts of XML data has become increa...
Michael Rys, Donald D. Chamberlin, Daniela Floresc...
PG
2003
IEEE
15 years 9 months ago
Non-Photorealistic Rendering and Content-Based Image Retrieval
In this paper, we will show how non-photorealistic rendering (NPR) can take a new role in content-based image retrieval (CBIR). We propose a content-based image retrieval method. ...
Xiaowen Ji, Zoltan Kato, Zhiyong Huang
ASIACRYPT
2000
Springer
15 years 8 months ago
On the Pseudorandomness of Top-Level Schemes of Block Ciphers
Block ciphers are usually based on one top-level scheme into which we plug “round functions”. To analyze security, it is important to study the intrinsic security provided by t...
Shiho Moriai, Serge Vaudenay