Sciweavers

154 search results - page 9 / 31
» Using Proofs by Coinduction to Find
Sort
View
SADFE
2008
IEEE
14 years 2 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
PLDI
2009
ACM
14 years 8 months ago
An integrated proof language for imperative programs
We present an integrated proof language for guiding the actions of multiple reasoning systems as they work together to prove complex correctness properties of imperative programs....
Karen Zee, Viktor Kuncak, Martin C. Rinard
CRYPTO
2004
Springer
108views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?
Many cryptographic primitives begin with parameter generation, which picks a primitive from a family. Such generation can use public coins (e.g., in the discrete-logarithm-based c...
Chun-Yuan Hsiao, Leonid Reyzin
ICCHP
2010
Springer
14 years 20 days ago
A Mobile Phone Application Enabling Visually Impaired Users to Find and Read Product Barcodes
Abstract. While there are many barcode readers available for identifying products in a supermarket or at home on mobile phones (e.g., Red Laser iPhone app), such readers are inacce...
Ender Tekin, James M. Coughlan
PAMI
2000
133views more  PAMI 2000»
13 years 7 months ago
Mode-Finding for Mixtures of Gaussian Distributions
I consider the problem of finding all the modes of a mixture of multivariate Gaussian distributions, which has applications in clustering and regression. I derive exact formulas f...
Miguel Á. Carreira-Perpiñán