Sciweavers

216 search results - page 4 / 44
» Additive envelopes of continuous functions
Sort
View
ASIACRYPT
2009
Springer
15 years 4 months ago
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
The design of cryptographic hash functions is a very complex and failure-prone process. For this reason, this paper puts forward a completely modular and fault-tolerant approach to...
Anja Lehmann, Stefano Tessaro
PEPM
2011
ACM
14 years 10 days ago
Ordering multiple continuations on the stack
Passing multiple continuation arguments to a function in CPS form allows one to encode a wide variety of direct-style control constructs, such as conditionals, exceptions, and mul...
Dimitrios Vardoulakis, Olin Shivers
ICAISC
2010
Springer
15 years 2 months ago
On the Distributivity of Fuzzy Implications over Continuous Archimedean Triangular Norms
Recently, the distributivity of fuzzy implications over t-norms, t-conorms and uninorms was studied in many articles. In this paper we characterize functions which satisfy one of ...
Michal Baczynski
ENTCS
2007
107views more  ENTCS 2007»
14 years 9 months ago
Event Domains, Stable Functions and Proof-Nets
We pursue the program of exposing the intrinsic mathematical structure of the “space of proofs” of a logical system [AJ94b]. We study the case of Multiplicative-Additive Linea...
Samson Abramsky
VLDB
2010
ACM
190views Database» more  VLDB 2010»
14 years 7 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias