Sciweavers

1888 search results - page 49 / 378
» Proof theory and computational analysis
Sort
View
LICS
1999
IEEE
15 years 4 months ago
Some Decision Problems of Enormous Complexity
We present some new decision and comparison problems of unusually high computational complexity. Most of the problems are strictly combinatorial in nature; others involve basic lo...
Harvey Friedman
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
14 years 11 months ago
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Michael Backes, Matteo Maffei, Dominique Unruh
86
Voted
FM
2009
Springer
123views Formal Methods» more  FM 2009»
15 years 7 months ago
"Carbon Credits" for Resource-Bounded Computations Using Amortised Analysis
Abstract. Bounding resource usage is important for a number of areas, notably real-time embedded systems and safety-critical systems. In this paper, we present a fully automatic st...
Steffen Jost, Hans-Wolfgang Loidl, Kevin Hammond, ...
101
Voted
SAC
2006
ACM
15 years 6 months ago
Provably faithful evaluation of polynomials
We provide sufficient conditions that formally guarantee that the floating-point computation of a polynomial evaluation is faithful. To this end, we develop a formalization of ï¬...
Sylvie Boldo, César Muñoz
117
Voted
CMSB
2006
Springer
15 years 4 months ago
Rewriting Game Theory as a Foundation for State-Based Models of Gene Regulation
We present a game-theoretic foundation for gene regulatory analysis based on the recent formalism of rewriting game theory. Rewriting game theory is discrete and comes with a graph...
Chafika Chettaoui, Franck Delaplace, Pierre Lescan...