Sciweavers

1888 search results - page 21 / 378
» Proof theory and computational analysis
Sort
View
POPL
2012
ACM
13 years 8 months ago
Probabilistic relational reasoning for differential privacy
Differential privacy is a notion of confidentiality that protects the privacy of individuals while allowing useful computations on their private data. Deriving differential priva...
Gilles Barthe, Boris Köpf, Federico Olmedo, S...
101
Voted
MPC
1995
Springer
125views Mathematics» more  MPC 1995»
15 years 4 months ago
Synthesizing Proofs from Programs in the Calculus of Inductive Constructions
We want to prove \automatically" that a program is correct with respect to a set of given properties that is a speci cation. Proofs of speci cations contain logical parts and ...
Catherine Parent
113
Voted
CCS
2005
ACM
15 years 6 months ago
Towards computationally sound symbolic analysis of key exchange protocols
d abstract) Prateek Gupta and Vitaly Shmatikov The University of Texas at Austin We present a cryptographically sound formal method for proving correctness of key exchange protoco...
Prateek Gupta, Vitaly Shmatikov
77
Voted
CDC
2009
IEEE
114views Control Systems» more  CDC 2009»
15 years 5 months ago
A computable type theory for control systems
— In this paper, we develop a theory of computable types suitable for the study of control systems. The theory uses type-two effectivity as the underlying computational model, bu...
Pieter Collins
CCA
2005
Springer
15 years 6 months ago
A Lambda Calculus for Real Analysis
Abstract Stone Duality is a revolutionary theory that works directly with computable continuous functions, without using set theory, infinitary lattice theory or a prior theory o...
Paul Taylor 0002