1
by Scarioni, Carlo., Scarioni, Carlo.
Published 2013
Subjects: ...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...
View full text
Electronic eBook
2
Published 2005
Table of Contents: ...Invited Papers -- Rough Sets and Flow Graphs -- A Modal Characterization of Indiscernibility...
View full text
Electronic eBook
3
Published 2006
Table of Contents: ... Signatures -- Applied Cryptography and Network Security -- Secure Set Membership Using 3Sat -- Left-to-Right...
View full text
Electronic eBook
4
Published 2008
Table of Contents: ... Answer Set Programming for Knowledge Representation and Reasoning: Future Directions -- Building a...
View full text
Electronic eBook
5
Published 2006
Table of Contents: ... -- Hashing and Message Authentication -- Constructing Secure Hash Functions by Enhancing Merkle-Damgård...
View full text
Electronic eBook
6
Published 2006
Table of Contents: ... Frameworks -- Regular Talks Theory -- Tableau Calculi for Answer Set Programming -- Declarative Semantics...
View full text
Electronic eBook
7
Published 2005
Table of Contents: ... in Answer-Set Programming -- Hybrid Probabilistic Logic Programs with Non-monotonic Negation -- Reducing...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ...Invited Lectures -- Composable Formal Security Analysis: Juggling Soundness, Simplicity...
View full text
Electronic eBook
9
Published 2006
Table of Contents: ... -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy...
View full text
Electronic eBook
10
Published 2006
Table of Contents: ... and Signatures -- Efficient Zero Knowledge on the Internet -- Independent Zero-Knowledge Sets -- An Efficient...
View full text
Electronic eBook
11
Published 2015
Table of Contents: ... Automata -- Analysis of Probabilistic Systems via Generating Functions and Padé Approximation...
View full text
Electronic eBook
12
Published 2010
Table of Contents: .... Semantics -- Game Semantics for Call-by-Value Polymorphism -- What Is a Pure Functional? -- Example-Guided...
View full text
Electronic eBook
13
Published 2008
Table of Contents: ...) Expected Time -- Function Evaluation Via Linear Programming in the Priced Information Model -- Improved...
View full text
Electronic eBook
14
Published 2007
Table of Contents: ... Codes -- Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms -- Unrestricted...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ...-Track A2. Security -- Online Network Design with Outliers -- Efficient Completely Non-malleable Public...
View full text
Electronic eBook
16
Published 2014
Table of Contents: ... Software with Recursive Functions (Invited Contribution) -- Track A: Algorithms, Complexity, and Games Weak...
View full text
Electronic eBook
17
Published 2013
Table of Contents: ... -- On Bar Recursion and Choice in a Classical Setting -- Proofs, Upside Down: A Functional Correspondence...
View full text
Electronic eBook
18
Published 2006
Table of Contents: ... Order Functional Programs -- Combining Typing and Size Constraints for Checking the Termination...
View full text
Electronic eBook
19
Published 2005
Table of Contents: ... of Imperative Programs by Constraint Solving -- Run-Time Profiling of Functional Logic Programs -- Constructive...
View full text
Electronic eBook
20
Published 2015
Table of Contents: ... Functions from Relations in Leon -- Program Analysis and Transformation -- Analyzing array manipulating...
View full text
Electronic eBook