Sciweavers

1176 search results - page 117 / 236
» Implicit Abstraction Heuristics
Sort
View
123
Voted
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
16 years 1 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
91
Voted
CADE
2007
Springer
16 years 1 months ago
Barendregt's Variable Convention in Rule Inductions
Abstract. Inductive definitions and rule inductions are two fundamental reasoning tools in logic and computer science. When inductive definitions involve binders, then Barendregt&#...
Christian Urban, Stefan Berghofer, Michael Norrish
85
Voted
ICSE
2008
IEEE-ACM
16 years 23 days ago
Formal concept analysis applied to fault localization
One time-consuming task in the development of software is debugging. Recent work in fault localization crosschecks traces of correct and failing execution traces, it implicitly se...
Peggy Cellier
124
Voted
ICFP
2005
ACM
16 years 19 days ago
Associated type synonyms
ML modules and Haskell type classes have proven to be highly effective tools for program structuring. Modules emphasize explicit configuration of program components and the use of...
Manuel M. T. Chakravarty, Gabriele Keller, Simon L...

Publication
107views
15 years 9 months ago
RATC: A Robust Automated Tag Clustering Technique
Abstract. Nowadays, the most dominant and noteworthy web information sources are developed according to the collaborative-web paradigm, also known as Web 2.0. In particular, it rep...
Ludovico Boratto, Salvatore Carta, Eloisa Vargiu