Sciweavers

1716 search results - page 194 / 344
» Proving Conditional Termination
Sort
View
107
Voted
JCS
2010
112views more  JCS 2010»
14 years 11 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
105
Voted
TIT
2008
108views more  TIT 2008»
14 years 11 months ago
Capacity Achieving LDPC Codes Through Puncturing
The performance of punctured LDPC codes under maximum-likelihood (ML) decoding is studied in this paper via deriving and analyzing their average weight distributions (AWDs) and th...
Chun-Hao Hsu, Achilleas Anastasopoulos
129
Voted
LATA
2010
Springer
14 years 11 months ago
Language-Based Comparison of Petri Nets with Black Tokens, Pure Names and Ordered Data
We apply language theory to compare the expressive power of models that extend Petri nets with features like colored tokens and/or whole place operations. Specifically, we conside...
Fernando Rosa Velardo, Giorgio Delzanno
LICS
2010
IEEE
14 years 11 months ago
Weak Equivalences in Psi-Calculi
Psi-calculi extend the pi-calculus with nominal datatypes to represent data, communication channels, and logics for facts and conditions. This general framework admits highly expr...
Magnus Johansson, Jesper Bengtson, Joachim Parrow,...
106
Voted
MLQ
2010
226views more  MLQ 2010»
14 years 11 months ago
The Ultrafilter Closure in ZF
: It is well known that, in a topological space, the open sets can be characterized using filter convergence. In ZF (Zermelo-Fraenkel set theory without the Axiom of Choice), we c...
Gonçalo Gutierres