Sciweavers

888 search results - page 134 / 178
» The Power of Temporal Proofs
Sort
View
KR
1994
Springer
15 years 1 months ago
An Application of Terminological Logics to Case-based Reasoning
A key problem in case-based reasoning is the representation, organization and maintenance of case libraries. While current approaches rely on heuristic and psychologically inspire...
Jana Koehler
ITP
2010
114views Mathematics» more  ITP 2010»
15 years 1 months ago
A New Foundation for Nominal Isabelle
Pitts et al introduced a beautiful theory about names and binding based on the notions of permutation and support. The engineering challenge is to smoothly adapt this theory to a t...
Brian Huffman, Christian Urban
CRYPTO
2006
Springer
89views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Oblivious Transfer and Linear Functions
Abstract. We study unconditionally secure 1-out-of-2 Oblivious Transfer (1-2 OT). We first point out that a standard security requirement for 1-2 OT of bits, namely that the receiv...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
15 years 1 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
GOSLER
1995
15 years 1 months ago
A Guided Tour Across the Boundaries of Learning Recursive Languages
The present paper deals with the learnability of indexed families of uniformly recursive languages from positive data as well as from both, positive and negative data. We consider...
Thomas Zeugmann, Steffen Lange