Sciweavers

2555 search results - page 197 / 511
» Quantifiers and Working Memory
Sort
View
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
16 years 4 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
CHI
2008
ACM
16 years 4 months ago
Socially respectful enjoyment tracking for tabletop games
This paper describes the current state of our ongoing work developing tools for tracking player enjoyment in traditional face-to-face tabletop gaming situations. The challenge pre...
Ben Kirman, Duncan Rowland
243
Voted
POPL
2004
ACM
16 years 4 months ago
Tridirectional typechecking
In prior work we introduced a pure type assignment system that encompasses a rich set of property types, including intersections, unions, and universally and existentially quantif...
Joshua Dunfield, Frank Pfenning
150
Voted
CADE
2005
Springer
16 years 4 months ago
Proof Planning for First-Order Temporal Logic
Proof planning is an automated reasoning technique which improves proof search by raising it to a meta-level. In this paper we apply proof planning to First-Order Linear Temporal L...
Claudio Castellini, Alan Smaill
248
Voted
ICDT
2010
ACM
259views Database» more  ICDT 2010»
16 years 1 months ago
Forward-XPath and extended register automata on data-trees
We consider a fragment of XPath named `forward-XPath', which contains all descendant and rightwards sibling axes as well as data equality and inequality tests. The satisfiabi...
Diego Figueira