Sciweavers

391 search results - page 64 / 79
» Formal Universes
Sort
View
ICFP
2010
ACM
15 years 1 months ago
Bidirectionalizing graph transformations
Bidirectional transformations provide a novel mechanism for synchronizing and maintaining the consistency of information between input and output. Despite many promising results o...
Soichiro Hidaka, Zhenjiang Hu, Kazuhiro Inaba, Hir...
JUCS
2008
113views more  JUCS 2008»
15 years 10 days ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
92
Voted
TIT
2008
90views more  TIT 2008»
15 years 8 days ago
Scanning and Sequential Decision Making for Multidimensional Data - Part II: The Noisy Case
We consider the problem of sequential decision making for random fields corrupted by noise. In this scenario, the decision maker observes a noisy version of the data, yet judged wi...
Asaf Cohen, Tsachy Weissman, Neri Merhav
91
Voted
MANSCI
2007
88views more  MANSCI 2007»
15 years 7 days ago
The Timing of Resource Development and Sustainable Competitive Advantage
We develop a formal model of the timing of resource development by competing …rms. Our aim is to deepen and extend resource-level theorizing about sustainable competitive advant...
Gonçalo Pacheco-de-Almeida, Peter Zemsky
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
14 years 3 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...