Sciweavers

1717 search results - page 237 / 344
» A Computable Spectral Theorem
Sort
View
ETFA
2006
IEEE
15 years 11 months ago
Implementation of an Internet-controlled system under variable delays
Abstract— This work deals with the control and the observation of a remote system using Internet as a communication line. The process consists in a Slave part S, with poor comput...
Alexandre Seuret, M. Termens-Ballester, A. Toguyen...
164
Voted
STOC
2006
ACM
116views Algorithms» more  STOC 2006»
15 years 11 months ago
Information-theoretically secure protocols and security under composition
We investigate the question of whether security of protocols in the information-theoretic setting (where the adversary is computationally unbounded) implies the security of these ...
Eyal Kushilevitz, Yehuda Lindell, Tal Rabin
156
Voted
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
15 years 11 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
LICS
2005
IEEE
15 years 11 months ago
Eager Normal Form Bisimulation
This paper describes two new bisimulation equivalences for the pure untyped call-by-value λ-calculus, called enf bisimilarity and enf bisimilarity up to η. They are based on eag...
Soren Lassen
ECSQARU
2005
Springer
15 years 11 months ago
A Possibilistic Inconsistency Handling in Answer Set Programming
Abstract. Both in classical logic and in Answer Set Programming, inconsistency is characterized by non existence of a model. Whereas every formula is a theorem for inconsistent set...
Pascal Nicolas, Laurent Garcia, Igor Stépha...