Sciweavers

9405 search results - page 305 / 1881
» Computing a Model of Set Theory
Sort
View
CALCO
2011
Springer
225views Mathematics» more  CALCO 2011»
14 years 4 months ago
Linearly-Used State in Models of Call-by-Value
Abstract. We investigate the phenomenon that every monad is a linear state monad. We do this by studying a fully-complete state-passing translation from an impure call-by-value lan...
Rasmus Ejlers Møgelberg, Sam Staton
CRYPTO
2005
Springer
125views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Secure Computation Without Authentication
In the setting of secure multiparty computation, a set of parties wish to jointly compute some function of their inputs. Such a computation must preserve certain security propertie...
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pa...
ITNG
2007
IEEE
15 years 11 months ago
Computational Power of the Quantum Turing Automata
Lots of efforts in the last decades have been done to prove or disprove whether the set of polynomially bounded problems is equal to the set of polynomially verifiable problems. T...
Sina Jafarpour, Mohammad Ghodsi, Keyvan Sadri, Zuh...
PODS
2006
ACM
137views Database» more  PODS 2006»
16 years 5 months ago
Data exchange: computing cores in polynomial time
Data exchange deals with inserting data from one database into another database having a different schema. We study and solve a central computational problem of data exchange, nam...
Georg Gottlob, Alan Nash
110
Voted
ATAL
2005
Springer
15 years 10 months ago
Temporal logics for normative agent communication protocols
We sketch how to express typical features of agent communication protocols in a simple temporal logic and show that conformance verification at runtime reduces to a generalised f...
Ulle Endriss