Sciweavers

10568 search results - page 319 / 2114
» Computer Intelligence and Formalization
Sort
View
FOSSACS
2006
Springer
15 years 7 months ago
Guessing Attacks and the Computational Soundness of Static Equivalence
The indistinguishability of two pieces of data (or two lists of pieces of data) can be represented formally in terms of a relation called static equivalence. Static equivalence dep...
Martín Abadi, Mathieu Baudet, Bogdan Warins...
117
Voted
CORR
1998
Springer
107views Education» more  CORR 1998»
15 years 3 months ago
Computing Declarative Prosodic Morphology
This paper describes a computational, declarative approach to prosodic morphology that uses inviolable constraints to denote small finite candidate sets which are filtered by a re...
Markus Walther
SEFM
2007
IEEE
15 years 10 months ago
Disciplining Orchestration and Conversation in Service-Oriented Computing
We give a formal account of a calculus for modeling service-based systems, suitable to describe both service composition (orchestration) and the protocol that services run when in...
Ivan Lanese, Francisco Martins, Vasco Thudichum Va...
FM
2003
Springer
107views Formal Methods» more  FM 2003»
15 years 9 months ago
Verifying Emulation of Legacy Mission Computer Systems
Processor obsolescence is a serious maintenance problem for long-lived embedded control systems. A practical solution is to interpose an emulator program between the ‘legacy’ s...
Colin J. Fidge
CRYPTO
2011
Springer
222views Cryptology» more  CRYPTO 2011»
14 years 3 months ago
Computer-Aided Security Proofs for the Working Cryptographer
Abstract. We present EasyCrypt, an automated tool for elaborating security proofs of cryptographic systems from proof sketches—compact, formal representations of the essence of a...
Gilles Barthe, Benjamin Grégoire, Sylvain H...