Sciweavers

1894 search results - page 130 / 379
» A TLA Proof System
Sort
View
144
Voted
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
15 years 10 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
LICS
2007
IEEE
15 years 10 months ago
Principles of Superdeduction
In predicate logic, the proof that a theorem P holds in a theory Th is typically conducted in natural deduction or in the sequent calculus using all the information contained in t...
Paul Brauner, Clément Houtmann, Claude Kirc...
166
Voted
TLCA
1997
Springer
15 years 7 months ago
Coinductive Axiomatization of Recursive Type Equality and Subtyping
We present new sound and complete axiomatizations of type equality and subtype inequality for a first-order type language with regular recursive types. The rules are motivated by ...
Michael Brandt, Fritz Henglein
CVPR
2005
IEEE
16 years 5 months ago
Object Recognition with Features Inspired by Visual Cortex
We introduce a novel set of features for robust object recognition. Each element of this set is a complex feature obtained by combining position- and scale-tolerant edgedetectors ...
Thomas Serre, Lior Wolf, Tomaso Poggio
120
Voted
ENTCS
2007
96views more  ENTCS 2007»
15 years 3 months ago
A List-machine Benchmark for Mechanized Metatheory: (Extended Abstract)
ed Metatheory (Extended Abstract) Andrew W. Appel Princeton University and INRIA Rocquencourt Xavier Leroy INRIA Rocquencourt We propose a benchmark to compare theorem-proving sys...
Andrew W. Appel, Xavier Leroy