Sciweavers

1786 search results - page 58 / 358
» The Structure of Factor Oracles
Sort
View
94
Voted
CADE
2007
Springer
16 years 1 months ago
A Termination Checker for Isabelle Hoare Logic
Abstract. Hoare logic is widely used for software specification and verification. Frequently we need to prove the total correctness of a program: to prove that the program not only...
Jia Meng, Lawrence C. Paulson, Gerwin Klein
76
Voted
FOCS
2007
IEEE
15 years 7 months ago
Planning for Fast Connectivity Updates
Understanding how a single edge deletion can affect the connectivity of a graph amounts to finding the graph bridges. But when faced with d > 1 deletions, can we establish as ...
Mihai Patrascu, Mikkel Thorup
SIGMOD
2005
ACM
133views Database» more  SIGMOD 2005»
15 years 6 months ago
XML and relational database management systems: the inside story
As XML has evolved from a document markup language to a widely-used format for exchange of structured and semistructured data, managing large amounts of XML data has become increa...
Michael Rys, Donald D. Chamberlin, Daniela Floresc...
113
Voted
PG
2003
IEEE
15 years 6 months ago
Non-Photorealistic Rendering and Content-Based Image Retrieval
In this paper, we will show how non-photorealistic rendering (NPR) can take a new role in content-based image retrieval (CBIR). We propose a content-based image retrieval method. ...
Xiaowen Ji, Zoltan Kato, Zhiyong Huang
ASIACRYPT
2000
Springer
15 years 5 months ago
On the Pseudorandomness of Top-Level Schemes of Block Ciphers
Block ciphers are usually based on one top-level scheme into which we plug “round functions”. To analyze security, it is important to study the intrinsic security provided by t...
Shiho Moriai, Serge Vaudenay