Sciweavers

769 search results - page 76 / 154
» Where Is the Proof
Sort
View
ENTCS
2008
109views more  ENTCS 2008»
13 years 9 months ago
Separation Logic for Multiple Inheritance
As an extension to Floyd-Hoare logic, separation logic has been used to facilitate reasoning about imperative programs manipulating shared mutable data structures. Recently, it ha...
Chenguang Luo, Shengchao Qin
AML
2006
87views more  AML 2006»
13 years 9 months ago
The modal logic of continuous functions on cantor space
Abstract Let L be a propositional language with standard Boolean connectives plus two modalities: an S4-ish topological modality and a temporal modality , understood as `next'...
Philip Kremer
APAL
2006
103views more  APAL 2006»
13 years 9 months ago
Canonical structure in the universe of set theory: part two
We prove a number of consistency results complementary to the ZFC results from our paper [4]. We produce examples of non-tightly stationary mutually stationary sequences, sequences...
James Cummings, Matthew Foreman, Menachem Magidor
COMBINATORICS
2007
75views more  COMBINATORICS 2007»
13 years 9 months ago
Maximal Projective Degrees for Strict Partitions
Let λ be a partition, and denote by fλ the number of standard tableaux of shape λ. The asymptotic shape of λ maximizing fλ was determined in the classical work of Logan and S...
D. Bernstein, A. Henke, A. Regev
JUCS
2008
143views more  JUCS 2008»
13 years 8 months ago
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Abstract: Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key g...
Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow