Sciweavers

769 search results - page 17 / 154
» Where Is the Proof
Sort
View
CORR
2011
Springer
153views Education» more  CORR 2011»
13 years 2 months ago
Proof-Theoretic Soundness and Completeness
We give a calculus for reasoning about the first-order fragment of classical logic that is adequate for giving the truth conditions of intuitionistic Kripke frames, and outline a...
Robert Rothenberg
ICASSP
2011
IEEE
12 years 11 months ago
A general proof of convergence for adaptive distributed beamforming schemes
This work focuses on the convergence analysis of adaptive distributed beamforming schemes that can be reformulated as local random search algorithms via a random search framework....
Chang-Ching Chen, Chia-Shiang Tseng, Che Lin
TAMC
2009
Springer
14 years 2 months ago
Best-Order Streaming Model
We study a new model of computation called stream checking on graph problems where a space-limited verifier has to verify a proof sequentially (i.e., it reads the proof as a strea...
Atish Das Sarma, Richard J. Lipton, Danupon Nanong...
WINE
2007
Springer
120views Economy» more  WINE 2007»
14 years 1 months ago
False-Name-Proof Mechanisms for Hiring a Team
We study the problem of hiring a team of selfish agents to perform a task. Each agent is assumed to own one or more elements of a set system, and the auctioneer is trying to purch...
Atsushi Iwasaki, David Kempe, Yasumasa Saito, Mahy...
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
14 years 1 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng