Sciweavers

1894 search results - page 322 / 379
» A TLA Proof System
Sort
View
130
Voted
TLCA
2007
Springer
15 years 9 months ago
Continuation-Passing Style and Strong Normalisation for Intuitionistic Sequent Calculi
Abstract. The intuitionistic fragment of the call-by-name version of Curien and Herbelin’s λµ˜µ-calculus is isolated and proved strongly normalising by means of an embedding ...
José Espírito Santo, Ralph Matthes, ...
136
Voted
ICNP
2006
IEEE
15 years 9 months ago
Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL
— This paper reports on an experiment in network protocol design: we use novel rigorous techniques in the design process of a new protocol, in a close collaboration between syste...
Adam Biltcliffe, Michael Dales, Sam Jansen, Tom Ri...
170
Voted
IEEESCC
2006
IEEE
15 years 9 months ago
Ontology Reconciliation for Service-Oriented Computing
Service-oriented computing (SOC) is viewed as the computing paradigm of the near future, allowing for the dynamic interaction of services provided by distributed business partners...
Jingshan Huang, Jiangbo Dang, Michael N. Huhns
143
Voted
ACL2
2006
ACM
15 years 9 months ago
Phylogenetic trees in ACL2
Biologists studying the evolutionary relationships between organisms use software packages to solve the computational problems they encounter. Several of these problems involve th...
Warren A. Hunt Jr., Serita M. Nelesen
117
Voted
MMSEC
2006
ACM
102views Multimedia» more  MMSEC 2006»
15 years 9 months ago
Zero-knowledge watermark detector robust to sensitivity attacks
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
Juan Ramón Troncoso-Pastoriza, Fernando P&e...