Sciweavers

5855 search results - page 986 / 1171
» Test generation and minimization with
Sort
View
ECCC
2007
144views more  ECCC 2007»
15 years 1 months ago
Algebraic Lower Bounds for Computing on Encrypted Data
In cryptography, there has been tremendous success in building primitives out of homomorphic semantically-secure encryption schemes, using homomorphic properties in a blackbox way...
Rafail Ostrovsky, William E. Skeith III
107
Voted
ENTCS
2007
126views more  ENTCS 2007»
15 years 1 months ago
Nominal Reasoning Techniques in Coq: (Extended Abstract)
d Abstract) Brian Aydemir Aaron Bohannon Stephanie Weirich Department of Computer and Information Science University of Pennsylvania Philadelphia, PA, USA We explore an axiomatize...
Brian E. Aydemir, Aaron Bohannon, Stephanie Weiric...
ENTCS
2007
126views more  ENTCS 2007»
15 years 1 months ago
Modelling Calculi with Name Mobility using Graphs with Equivalences
In the theory of graph rewriting, the use of coalescing rules, i.e., of rules which besides deleting and generating graph items, can coalesce some parts of the graph, turns out to...
Paolo Baldan, Fabio Gadducci, Ugo Montanari
JSAC
2006
120views more  JSAC 2006»
15 years 1 months ago
Multiple-Source Internet Tomography
Abstract-- Information about the topology and link-level characteristics of a network is critical for many applications including network diagnostics and management. However, this ...
Michael Rabbat, Mark Coates, Robert D. Nowak
83
Voted
ET
2007
67views more  ET 2007»
15 years 1 months ago
A Formal Analysis of Fault Diagnosis with D-matrices
As new approaches and algorithms are developed for system diagnosis, it is important to reflect on existing approaches to determine their strengths and weaknesses. Of concern is i...
John W. Sheppard, S. G. W. Butcher