Sciweavers

661 search results - page 40 / 133
» Argument Reduction by Factoring
Sort
View
CADE
2006
Springer
15 years 10 months ago
Strong Cut-Elimination Systems for Hudelmaier's Depth-Bounded Sequent Calculus for Implicational Logic
Abstract. Inspired by the Curry-Howard correspondence, we study normalisation procedures in the depth-bounded intuitionistic sequent calculus of Hudelmaier (1988) for the implicati...
Roy Dyckhoff, Delia Kesner, Stéphane Lengra...
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
15 years 4 months ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...
KBSE
2009
IEEE
15 years 4 months ago
Understanding the Value of Software Engineering Technologies
SEESAW combines AI search tools, a Monte Carlo simulator, and some software process models. We show here that, when selecting technologies for a software project, SEESAW out-perfo...
Phillip Green II, Tim Menzies, Steve Williams, Ous...
IROS
2006
IEEE
82views Robotics» more  IROS 2006»
15 years 3 months ago
Mission Reliability Estimation for Multirobot Team Design
 One reason given for the use of multirobot systems is that many cheap robots are more reliable than one expensive robot. To date, however, there has been no quantitative analys...
S. B. Stancliff, John M. Dolan, Ashitey Trebi-Olle...
IMA
2005
Springer
71views Cryptology» more  IMA 2005»
15 years 3 months ago
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
Abstract. The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi et al. and Vazirani and Vazirani, who proved independently that O(log...
Andrey Sidorenko, Berry Schoenmakers