Sciweavers

ASIAN
2006
Springer
118views Algorithms» more  ASIAN 2006»
14 years 3 months ago
An Approach to Formal Verification of Arithmetic Functions in Assembly
Abstract. It is customary to write performance-critical parts of arithmetic functions in assembly: this enables finely-tuned algorithms that use specialized processor instructions....
Reynald Affeldt, Nicolas Marti
ASIAN
2006
Springer
91views Algorithms» more  ASIAN 2006»
14 years 3 months ago
A Type-Theoretic Framework for Formal Reasoning with Different Logical Foundations
Abstract. A type-theoretic framework for formal reasoning with different logical foundations is introduced and studied. With logic-enriched type theories formulated in a logical fr...
Zhaohui Luo
ASIAN
2006
Springer
116views Algorithms» more  ASIAN 2006»
14 years 3 months ago
Secrecy Analysis in Protocol Composition Logic
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
ASIAN
2006
Springer
134views Algorithms» more  ASIAN 2006»
14 years 3 months ago
Computational Soundness of Formal Indistinguishability and Static Equivalence
In the investigation of the relationship between the formal and the computational view of cryptography, a recent approach, first proposed in [10], uses static equivalence from cryp...
Gergei Bana, Payman Mohassel, Till Stegers
ASIAN
2006
Springer
104views Algorithms» more  ASIAN 2006»
14 years 3 months ago
Closing Internal Timing Channels by Transformation
Abstract. A major difficulty for tracking information flow in multithreaded programs is due to the internal timing covert channel. Information is leaked via this channel when secre...
Alejandro Russo, John Hughes, David A. Naumann, An...
ASIAN
2006
Springer
152views Algorithms» more  ASIAN 2006»
14 years 3 months ago
Inferring Disjunctive Postconditions
Polyhedral analysis [9] is an abstract interpretation used for automatic discovery of invariant linear inequalities among numerical varia program. Convexity of this abstract domain...
Corneliu Popeea, Wei-Ngan Chin
ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
14 years 3 months ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh
ASIAN
2006
Springer
76views Algorithms» more  ASIAN 2006»
14 years 3 months ago
Responsiveness in Process Calculi
Abstract. In a process calculus, an agent guarantees responsive usage of a channel name r if a communication along r is guaranteed to eventually take place. Responsiveness is impor...
Lucia Acciai, Michele Boreale
ASIAN
2006
Springer
131views Algorithms» more  ASIAN 2006»
14 years 3 months ago
FORM : A Federated Rights Expression Model for Open DRM Frameworks
Abstract. Digital Rights Management frameworks (DRM) aim at protecting and controlling information contents widely distributed on client devices. Using a license, the content provi...
Thierry Sans, Frédéric Cuppens, Nora...
CG
2004
Springer
14 years 3 months ago
Locally Informed Global Search for Sums of Combinatorial Games
Abstract. There are two complementary approaches to playing sums of combinatorial games. They can be characterized as local analysis and global search. Algorithms from combinatoria...
Martin Müller 0003, Zhichao Li