Sciweavers

642 search results - page 65 / 129
» corr 2006
Sort
View
76
Voted
CORR
2006
Springer
103views Education» more  CORR 2006»
15 years 17 days ago
Expressing Security Properties Using Selective Interleaving Functions
McLean's notion of Selective Interleaving Functions (SIFs) is perhaps the bestknown attempt to construct a framework for expressing various security properties. We examine th...
Joseph Y. Halpern, Sabina Petride
101
Voted
CORR
2006
Springer
99views Education» more  CORR 2006»
15 years 17 days ago
An Embedding of the BSS Model of Computation in Light Affine Lambda-Calculus
This paper brings together two lines of research: implicit characterization of complexity classes by Linear Logic (LL) on the one hand, and computation over an arbitrary ring in t...
Patrick Baillot, Marco Pedicini
95
Voted
CORR
2006
Springer
90views Education» more  CORR 2006»
15 years 17 days ago
Symmetric Subresultants and Applications
Schur's transforms of a polynomial are used to count its roots in the unit disk. These are generalized them by introducing the sequence of symmetric sub-resultants of two pol...
Cyril Brunie, Philippe Saux Picart
102
Voted
CORR
2006
Springer
100views Education» more  CORR 2006»
15 years 17 days ago
Using groups for investigating rewrite systems
We describe several technical tools that prove to be efficient for investigating the rewrite systems associated with an equational specification. These tools consist in introducing...
Patrick Dehornoy
90
Voted
CORR
2006
Springer
132views Education» more  CORR 2006»
15 years 17 days ago
Cross-Entropy method: convergence issues for extended implementation
The cross-entropy method (CE) developed by R. Rubinstein is an elegant practical principle for simulating rare events. The method approximates the probability of the rare event by...
Frédéric Dambreville