• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 11,292
Next 10 →

(preliminary full version)

by Christopher Karlsson, Linus Stankovski, Paul Hell, Link To Publication, Linus Karlsson, Paul Stankovski, Martin Hell , 2016
"... Streams (preliminary full version). [Publisher information missing]. ..."
Abstract - Add to MetaCart
Streams (preliminary full version). [Publisher information missing].

Full Version

by unknown authors , 2005
"... and seven threats facing online dating sites and the potential risk consumers face during this transition. ..."
Abstract - Add to MetaCart
and seven threats facing online dating sites and the potential risk consumers face during this transition.

Full version available in

by Michael Wright, Mark L. J - In ACM Symposium on Lisp and Functional Programming (LFP , 1994
"... Die ZBW räumt Ihnen als Nutzerin/Nutzer das unentgeltliche, räumlich unbeschränkte und zeitlich auf die Dauer des Schutzrechts beschränkte einfache Recht ein, das ausgewählte Werk im Rahmen der unter ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Die ZBW räumt Ihnen als Nutzerin/Nutzer das unentgeltliche, räumlich unbeschränkte und zeitlich auf die Dauer des Schutzrechts beschränkte einfache Recht ein, das ausgewählte Werk im Rahmen der unter

Cryptanalysis of KLEIN (Full version) ∗

by Virginie Lallem
"... Abstract. Due to the recent emergence of resource-constrained devices, cryptographers are facing the problem of designing dedicated lightweight ciphers. KLEIN is one of the resulting primitives, proposed at RFIDSec in 2011 by Gong et al. This family of software-oriented block ciphers has an innovati ..."
Abstract - Add to MetaCart
an innovative structure, as it combines 4-bit Sboxes with the AES MixColumn transformation, and has woken up the attention of cryptanalysts. Several security analyses have been published, in particular on the 64-bit key version. The best of these results could attack up to 10 rounds out of the total number

Symmetric Lenses (Full version)

by Martin Hofmann, Benjamin Pierce, Daniel Wagner
"... Lenses—bidirectional transformations between pairs of connected structures—have been extensively studied and are beginning to find their way into industrial practice. However, some aspects of their foundations remain poorly understood. In particular, most previous work has focused on the special cas ..."
Abstract - Add to MetaCart
and settle some longstanding questions about their properties—in particular, we prove the existence of (symmetric monoidal) tensor products and sums and the non-existence of full categorical products or sums in the category of symmetric lenses. We then show how the methods of universal algebra can be applied

Safety Properties (full version)

by Étienne André, Romain Soulat, École Normale, Supérieure Cachan, Étienne André, Romain Soulat , 2011
"... Abstract. Safety properties are crucial when verifying real-time concurrent systems. When reasoning parametrically, i.e., with unknown constants, it is of high interest to infer a set of parameter valuations consistent with such safety properties. We present here algorithms based on the “inverse met ..."
Abstract - Add to MetaCart
Abstract. Safety properties are crucial when verifying real-time concurrent systems. When reasoning parametrically, i.e., with unknown constants, it is of high interest to infer a set of parameter valuations consistent with such safety properties. We present here algorithms based on the “inverse method ” for parametric timed automata: given a reference parameter valuation, it infers a constraint such that, for any valuation satisfying this constraint, the system behaves the same as under the reference valuation in terms of traces, i.e., alternating sequences of locations and actions. Those algorithms do not guarantee the equality of traces, but are significantly quicker, synthesize larger sets of parameter valuations than the original inverse method, and still preserve various properties including safety properties. Those algorithms have been implemented in Imitator II and applied to examples of circuits and protocols. 1

Cycles and Stability (full version)

by V. Nikiforov, R. H. Schelp , 2006
"... We prove a number of Turán and Ramsey type stability results for cycles, in particular, the following one: Let n 4, 0 < 1=2 1=2n, and the edges of Kb(2 )nc be 2-colored so that no mononchromatic Cn exists. Then, for some q 2 ((1 )n 1; n) ; we may drop a vertex v so that in Kb(2 )nc v one o ..."
Abstract - Add to MetaCart
We prove a number of Turán and Ramsey type stability results for cycles, in particular, the following one: Let n 4, 0 < 1=2 1=2n, and the edges of Kb(2 )nc be 2-colored so that no mononchromatic Cn exists. Then, for some q 2 ((1 )n 1; n) ; we may drop a vertex v so that in Kb(2 )nc v one of the colors induces Kq;b(2 )ncq1; while the other one induces Kq [Kb(2 )ncq1: We also derive the following Ramsey type result. If n is su ¢ ciently large and G is a graph of order 2n 1; with minimum degree (G) 2 106n; then for every 2-coloring of E (G) one of the colors contains cycles Ct for all t 2 [3; n]: 1

Documentary and Descriptive Linguistics (full version

by Nikolaus P. Himmelmann, Ruhr-universität Bochum - In Osamu Sakiyama and Fubito Endo (eds.), Lectures on Endangered Languages 5, 37-83. Kyoto: Endangered Languages of the Pacific Rim , 2002
"... Much of the work that is labeled ‘descriptive ’ within linguistics comprises two activities, i.e. the collection of primary data and a (low-level) analysis of these data. These are indeed two separate activities as shown by the fact that the methods employed in each activity differ substantially. To ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
Much of the work that is labeled ‘descriptive ’ within linguistics comprises two activities, i.e. the collection of primary data and a (low-level) analysis of these data. These are indeed two separate activities as shown by the fact that the methods employed in each activity differ substantially. To date, the field concerned with the first activity — called ‘documentary linguistics ’ here — has received very little attention from linguists. It is proposed that documentary linguistics be conceived of as a fairly independent field of linguistic inquiry and practice which is no longer linked exclusively to the descriptive framework. A format for language documentations (in contrast to language descriptions) is presented and various practical and theoretical issues connected with this format are discussed. These include the rights of the individuals and communities contributing to a language documentation, the parameters for the selection of the data to be included in a documentation, and the assessment of the quality of such data. 1 1.

Queries with Guarded Negation (full version)∗

by Tu Darmstadt, Balder Ten Cate, Martin Otto
"... A well-established and fundamental insight in database the-ory is that negation (also known as complementation) tends to make queries difficult to process and difficult to reason about. Many basic problems are decidable and admit prac-tical algorithms in the case of unions of conjunctive queries, bu ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
A well-established and fundamental insight in database the-ory is that negation (also known as complementation) tends to make queries difficult to process and difficult to reason about. Many basic problems are decidable and admit prac-tical algorithms in the case of unions of conjunctive queries, but become difficult or even undecidable when queries are allowed to contain negation. Inspired by recent results in fi-nite model theory, we consider a restricted form of negation, guarded negation. We introduce a fragment of SQL, called GN-SQL, as well as a fragment of Datalog with stratified negation, called GN-Datalog, that allow only guarded nega-tion, and we show that these query languages are compu-tationally well behaved, in terms of testing query contain-ment, query evaluation, open-world query answering, and boundedness. GN-SQL and GN-Datalog subsume a num-ber of well known query languages and constraint languages, such as unions of conjunctive queries, monadic Datalog, and frontier-guarded tgds. In addition, an analysis of standard benchmark workloads shows that most usage of negation in SQL in practice is guarded negation. 1.

full version. Unrestricted Aggregate Signatures

by Mihir Bellare, Chanathip Namprempre, Gregory Neven , 2006
"... Secure use of the BGLS [7] aggregate signature schemes is restricted to the aggregation of distinct messages (for the basic scheme) or per-signer distinct messages (for the enhanced, prepend-public-key version of the scheme). We argue that these restrictions preclude interesting applications, make u ..."
Abstract - Add to MetaCart
Secure use of the BGLS [7] aggregate signature schemes is restricted to the aggregation of distinct messages (for the basic scheme) or per-signer distinct messages (for the enhanced, prepend-public-key version of the scheme). We argue that these restrictions preclude interesting applications, make
Next 10 →
Results 1 - 10 of 11,292
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University