Sciweavers

1716 search results - page 194 / 344
» Proving Conditional Termination
Sort
View
JCS
2010
112views more  JCS 2010»
15 years 1 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
TIT
2008
108views more  TIT 2008»
15 years 1 months ago
Capacity Achieving LDPC Codes Through Puncturing
The performance of punctured LDPC codes under maximum-likelihood (ML) decoding is studied in this paper via deriving and analyzing their average weight distributions (AWDs) and th...
Chun-Hao Hsu, Achilleas Anastasopoulos
LATA
2010
Springer
15 years 1 months ago
Language-Based Comparison of Petri Nets with Black Tokens, Pure Names and Ordered Data
We apply language theory to compare the expressive power of models that extend Petri nets with features like colored tokens and/or whole place operations. Specifically, we conside...
Fernando Rosa Velardo, Giorgio Delzanno
LICS
2010
IEEE
15 years 1 months ago
Weak Equivalences in Psi-Calculi
Psi-calculi extend the pi-calculus with nominal datatypes to represent data, communication channels, and logics for facts and conditions. This general framework admits highly expr...
Magnus Johansson, Jesper Bengtson, Joachim Parrow,...
MLQ
2010
226views more  MLQ 2010»
15 years 1 months ago
The Ultrafilter Closure in ZF
: It is well known that, in a topological space, the open sets can be characterized using filter convergence. In ZF (Zermelo-Fraenkel set theory without the Axiom of Choice), we c...
Gonçalo Gutierres