Sciweavers

503 search results - page 64 / 101
» Verifying Quantitative Properties Using Bound Functions
Sort
View
STOC
2007
ACM
102views Algorithms» more  STOC 2007»
15 years 10 months ago
Zero-knowledge from secure multiparty computation
A zero-knowledge proof allows a prover to convince a verifier of an assertion without revealing any further information beyond the fact that the assertion is true. Secure multipar...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
AUTOMATICA
1999
84views more  AUTOMATICA 1999»
14 years 9 months ago
Optimizing the receiver maneuvers for bearings-only tracking
This paper deals with the optimization of the observer trajectory for target motion analysis. The observations are made of estimated bearings. The problem consists in determining ...
Jean-Pierre Le Cadre, S. Laurent-Michel
ENTCS
2008
110views more  ENTCS 2008»
14 years 9 months ago
Game-Based Probabilistic Predicate Abstraction in PRISM
ion in PRISM1 Mark Kattenbelt Marta Kwiatkowska Gethin Norman David Parker Oxford University Computing Laboratory, Oxford, UK Modelling and verification of systems such as communi...
Mark Kattenbelt, Marta Z. Kwiatkowska, Gethin Norm...
TOPLAS
2008
81views more  TOPLAS 2008»
14 years 9 months ago
Size-change termination with difference constraints
lem of inferring termination from such abstract information is not the halting problem for programs and may well be decidable. If this is the case, the decision algorithm forms a &...
Amir M. Ben-Amram
FORMATS
2004
Springer
15 years 1 months ago
A Unified Fault-Tolerance Protocol
Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Waker...
Paul S. Miner, Alfons Geser, Lee Pike, Jeffrey Mad...