Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...
A number of serious reasons will convince an increasing amount of researchers to store their relevant material in centers which we will call "language resource archives"...
Peter Wittenburg, Daan Broeder, Wolfgang Klein, St...
Abstract. This paper defends an augmented cognitively oriented "genericdesign hypothesis": There are both significant similarities between the design activities implement...
We introduce a new approach to take into account the memory architecture and the memory mapping in the High- Level Synthesis of Real-Time embedded systems. We formalize the memory...
We bound the future loss when predicting any (computably) stochastic sequence online. Solomonoff finitely bounded the total deviation of his universal predictor M from the true d...