Sciweavers

1401 search results - page 53 / 281
» Randomness in Interactive Proofs
Sort
View
SIAMCOMP
2002
112views more  SIAMCOMP 2002»
14 years 9 months ago
The Efficiency of Resolution and Davis--Putnam Procedures
We consider several problems related to the use of resolution-based methods for determining whether a given boolean formula in conjunctive normal form is satisfiable. First, build...
Paul Beame, Richard M. Karp, Toniann Pitassi, Mich...
CCS
2009
ACM
15 years 4 months ago
Battle of Botcraft: fighting bots in online games with human observational proofs
The abuse of online games by automated programs, known as game bots, for gaining unfair advantages has plagued millions of participating players with escalating severity in recent...
Steven Gianvecchio, Zhenyu Wu, Mengjun Xie, Hainin...
VSTTE
2005
Springer
15 years 3 months ago
Verifying Design with Proof Scores
: Verifying design instead of code can be an effective and practical approach to obtaining verified software. This paper argues that proof scores are an attractive method for ver...
Kokichi Futatsugi, Joseph A. Goguen, Kazuhiro Ogat...
CAV
1998
Springer
175views Hardware» more  CAV 1998»
15 years 1 months ago
An ACL2 Proof of Write Invalidate Cache Coherence
As a pedagogical exercise in ACL2, we formalize and prove the correctness of a write invalidate cache scheme. In our formalization, an arbitrary number of processors, each with its...
J. Strother Moore
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 4 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...