Sciweavers

2586 search results - page 148 / 518
» Automatic Abstraction for Congruences
Sort
View
AAAI
2006
14 years 11 months ago
Domain-Independent Structured Duplicate Detection
The scalability of graph-search algorithms can be greatly extended by using external memory, such as disk, to store generated nodes. We consider structured duplicate detection, an...
Rong Zhou, Eric A. Hansen
APLAS
2010
ACM
14 years 7 months ago
Metric Spaces and Termination Analyses
We present a framework for defining abstract interpreters for liveness properties, in particular program termination. The framework makes use of the theory of metric spaces to defi...
Aziem Chawdhary, Hongseok Yang
FSTTCS
2003
Springer
15 years 3 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
IANDC
2007
84views more  IANDC 2007»
14 years 10 months ago
The perfectly synchronized round-based model of distributed computing
ectly-synchronized round-based model provides the powerful abstraction of op failures with atomic and synchronous message delivery. This abstraction makes distributed programming ...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...
AAAI
2004
14 years 11 months ago
Mixed-Initiative Workflow Composition
CAT's knowledge base contains abstract task or example "abstract flight reservation task," which can be included in a workflow as placeholders. CAT will gest that us...
Marc Spraragen