Sciweavers

1894 search results - page 330 / 379
» A TLA Proof System
Sort
View
143
Voted
ADC
2004
Springer
141views Database» more  ADC 2004»
15 years 7 months ago
Conflict Scheduling of Transactions on XML Documents
In the last few years an interest in native XML databases has surfaced. With other authors we argue that such databases need their own provisions for concurrency control since tra...
Stijn Dekeyser, Jan Hidders
129
Voted
ASPDAC
2004
ACM
94views Hardware» more  ASPDAC 2004»
15 years 7 months ago
Improving simulation-based verification by means of formal methods
The design of complex systems is largely ruled by the time needed for verification. Even though formal methods can provide higher reliability, in practice often simulation based ve...
Görschwin Fey, Rolf Drechsler
ASIACRYPT
2006
Springer
15 years 7 months ago
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al. [13] introduced the notion of indiff...
Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yu...
131
Voted
ATAL
2006
Springer
15 years 7 months ago
False-name-proof combinatorial auction protocol: Groves Mechanism with SubModular Approximation
This paper develops a new combinatorial auction protocol called the Groves Mechanism with SubModular Approximation (GM-SMA). This protocol satisfies the following characteristics:...
Makoto Yokoo, Toshihiro Matsutani, Atsushi Iwasaki
129
Voted
BIRTHDAY
2006
Springer
15 years 7 months ago
Best-First Rippling
Rippling is a form of rewriting that guides search by only performing steps that reduce the syntactic differences between formulae. Termination is normally ensured by a measure th...
Moa Johansson, Alan Bundy, Lucas Dixon