Sciweavers

1888 search results - page 131 / 378
» Proof theory and computational analysis
Sort
View
IEEEARES
2009
IEEE
14 years 10 months ago
Quantitative Analysis of Secure Information Flow via Probabilistic Semantics
We present an automatic analyzer for measuring information flow within software systems. In this paper, we quantify leakage in terms of information theory and incorporate this comp...
Chunyan Mu, David Clark
90
Voted
IWCMC
2006
ACM
15 years 6 months ago
SINR analysis for V-BLAST with ordered MMSE-SIC detection
A new way to determine the exact layer-wise SINR distribution for V-BLAST with successive interference cancellation at the receiver is presented. In contrast to previous publicati...
Ronald Böhnke, Karl-Dirk Kammeyer
76
Voted
ORL
2007
97views more  ORL 2007»
15 years 3 days ago
Analysis on the forward market equilibrium model
We establish the existence results for the Allaz–Vila [B. Allaz, J.-L. Vila, Cournot competition, forward markets and efficiency, J. Econ. Theory 59 (1993) 1–16] forward mark...
Che-Lin Su
SODA
2010
ACM
160views Algorithms» more  SODA 2010»
15 years 10 months ago
Solving Simple Stochastic Tail Games
Stochastic games are a natural model for open reactive processes: one player represents the controller and his opponent represents a hostile environment. The evolution of the syste...
Hugo Gimbert, Florian Horn
116
Voted
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
15 years 7 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev