Sciweavers

5344 search results - page 226 / 1069
» Privacy-Preserving Set Operations
Sort
View
ENTCS
2007
101views more  ENTCS 2007»
15 years 3 months ago
Inequational Deduction as Term Graph Rewriting
Multi-algebras allow to model nondeterminism in an algebraic framework by interpreting operators as functions from individual arguments to sets of possible results. We propose a s...
Andrea Corradini, Fabio Gadducci, Wolfram Kahl, Ba...
MSCS
2006
93views more  MSCS 2006»
15 years 3 months ago
Uniform regular enumerations
Abstract. In the paper we introduce and study the uniform regular enumerations for arbitrary recursive ordinals. As an application of the technique we obtain a uniform generalizati...
Ivan N. Soskov, Bogomil Kovachev
112
Voted
RC
2006
88views more  RC 2006»
15 years 3 months ago
Geometric Constructions with Discretized Random Variables
We generalize the DEnv (Distribution envelope determination) method for bounding the result of arithmetic operations on random variables with unknown dependence to higher-dimension...
Hans-Peter Schröcker, Johannes Wallner
128
Voted
IPL
2007
125views more  IPL 2007»
15 years 3 months ago
State explosion in almost-sure probabilistic reachability
We show that the problem of reaching a state set with probability 1 in probabilisticnondeterministic systems operating in parallel is EXPTIME-complete. We then show that this prob...
François Laroussinie, Jeremy Sproston
107
Voted
TVLSI
2008
123views more  TVLSI 2008»
15 years 3 months ago
Cost-Efficient SHA Hardware Accelerators
Abstract--This paper presents a new set of techniques for hardware implementations of Secure Hash Algorithm (SHA) hash functions. These techniques consist mostly in operation resch...
Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Sta...