Sciweavers

3820 search results - page 563 / 764
» Bounded Model Debugging
Sort
View
CRYPTO
2007
Springer
162views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
Universally-Composable Two-Party Computation in Two Rounds
Round complexity is a central measure of efficiency, and characterizing the round complexity of various cryptographic tasks is of both theoretical and practical importance. We show...
Omer Horvitz, Jonathan Katz
DNA
2007
Springer
15 years 9 months ago
Staged Self-assembly: Nanomanufacture of Arbitrary Shapes with O (1) Glues
We introduce staged self-assembly of Wang tiles, where tiles can be added dynamically in sequence and where intermediate constructions can be stored for later mixing. This model a...
Erik D. Demaine, Martin L. Demaine, Sándor ...
EUROCRYPT
2007
Springer
15 years 9 months ago
Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility
We study conditional computational entropy: the amount of randomness a distribution appears to have to a computationally bounded observer who is given some correlated information....
Chun-Yuan Hsiao, Chi-Jen Lu, Leonid Reyzin
FMCAD
2007
Springer
15 years 9 months ago
Exploiting Resolution Proofs to Speed Up LTL Vacuity Detection for BMC
—When model-checking reports that a property holds on a model, vacuity detection increases user confidence in this result by checking that the property is satisfied in the inte...
Jocelyn Simmonds, Jessica Davies, Arie Gurfinkel, ...
IPCCC
2006
IEEE
15 years 9 months ago
The delay distribution of IEEE 802.11e EDCA and 802.11 DCF
A number of works have focused on the mean delay performance of IEEE 802.11 [1]. The main contribution of this paper is that it provides a method to obtain the full distribution o...
Paal E. Engelstad, Olav N. Østerbø