Sciweavers

564 search results - page 99 / 113
» Proof General: A Generic Tool for Proof Development
Sort
View
GECCO
2009
Springer
101views Optimization» more  GECCO 2009»
15 years 6 months ago
Modeling UCS as a mixture of experts
We present a probabilistic formulation of UCS (a sUpervised Classifier System). UCS is shown to be a special case of mixture of experts where the experts are learned independentl...
Narayanan Unny Edakunni, Tim Kovacs, Gavin Brown, ...
POPL
2001
ACM
16 years 17 hour ago
Mobile values, new names, and secure communication
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are ...
Cédric Fournet, Martín Abadi
CRYPTO
2008
Springer
186views Cryptology» more  CRYPTO 2008»
15 years 1 months ago
Communication Complexity in Algebraic Two-Party Protocols
In cryptography, there has been tremendous success in building various two-party protocols with small communication complexity out of homomorphic semantically-secure encryption sc...
Rafail Ostrovsky, William E. Skeith III
ECOOP
2008
Springer
15 years 1 months ago
A Unified Framework for Verification Techniques for Object Invariants
Verification of object-oriented programs relies on object invariants which express consistency criteria of objects. The semantics of object invariants is subtle, mainly because of...
Sophia Drossopoulou, Adrian Francalanza, Peter M&u...
CCS
2011
ACM
13 years 11 months ago
Privacy and accountability for location-based aggregate statistics
A significant and growing class of location-based mobile applications aggregate position data from individual devices at a server and compute aggregate statistics over these posi...
Raluca A. Popa, Andrew J. Blumberg, Hari Balakrish...