نتایج جستجو برای: analyzing these proofs

تعداد نتایج: 3169689  

Journal: :CoRR 2014
Tero Laitinen Tommi A. Junttila Ilkka Niemelä

Modern conflict-driven clause learning (CDCL) SAT solvers are very good in solving conjunctive normal form (CNF) formulas. However, some application problems involve lots of parity (xor) constraints which are not necessarily efficiently handled if translated into CNF. This paper studies solving CNF formulas augmented with xor-clauses in the DPLL(XOR) framework where a CDCL SAT solver is coupled...

2010
Brigitte Pientka

The logical framework LF provides an elegant foundation for specifying formal systems and proofs and it is used successfully in a wide range of applications such as certifying code and mechanizing metatheory of programming languages. However, incorporating LF technology into functional programming to allow programmers to specify and reason about formal guarantees of their programs from within t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

abstract because of the many geopolitical, geo economical and geo strategically potentials and communicational capabilities of eco region, members can expand the convergence and the integration in base of this organization that have important impact on members development and expanding peace in international and regional level. based on quality analyzing of library findings and experts interv...

2012
Tero Laitinen Tommi A. Junttila Ilkka Niemelä

Modern conflict-driven clause learning (CDCL) SAT solvers are very good in solving conjunctive normal form (CNF) formulas. However, some application problems involve lots of parity (xor) constraints which are not necessarily efficiently handled if translated into CNF. This paper studies solving CNF formulas augmented with xor-clauses in the DPLL(XOR) framework where a CDCL SAT solver is coupled...

Journal: :Health policy and planning 2014
Pradeep Panda Arpita Chakraborty David M Dror Arjun S Bedi

This article assesses insurance uptake in three community-based health insurance (CBHI) schemes located in rural parts of two of India's poorest states and offered through women's self-help groups (SHGs). We examine what drives uptake, the degree of inclusive practices of the schemes and the influence of health status on enrolment. The most important finding is that a household's socio-economic...

Journal: :Lecture Notes in Computer Science 2021

In this research a general theoretical framework for clustering is proposed over specific partial algebraic systems by the present author. Her theory helps in isolating minimal assumptions necessary different concepts of information any form to be realized situation (and therefore semantics). It well-known that limited number proofs hard and soft are known exist, most involve statistical assump...

Journal: :CoRR 2018
Dominique Unruh

We present a logic for reasoning about pairs of interactive quantum programs – quantum relational Hoare logic (qRHL). This logic follows the spirit of probabilistic relational Hoare logic (Barthe et al. 2009) and allows us to formulate how the outputs of two quantum programs relate given the relationship of their inputs. Probabilistic RHL was used extensively for computer-verified security proo...

Journal: :IACR Cryptology ePrint Archive 2004
Mihir Bellare Phillip Rogaway

The game-playing technique is a powerful tool for analyzing cryptographic constructions. We illustrate this by using games as the central tool for proving security of three-key tripleencryption, a long-standing open problem. Our result, which is in the ideal-cipher model, demonstrates that for DES parameters (56-bit keys and 64-bit plaintexts) an adversary’s maximal advantage is small until it ...

2010
YINGHUI WANG

5 2 is the golden mean. Surprisingly, no one appears to have investigated the distribution of the number of summands; our main result is that this converges to a Gaussian as n → ∞. Moreover, such a result holds not just for the Fibonacci numbers but many other problems, such as linear recurrence relation with non-negative integer coefficients (which is a generalization of base B expansions of n...

Journal: :IACR Cryptology ePrint Archive 2016
Sanjit Chatterjee Neal Koblitz Alfred Menezes Palash Sarkar

How to deal with large tightness gaps in security proofs is a vexing issue in cryptography. Even when analyzing protocols that are of practical importance, leading researchers often fail to treat this question with the seriousness that it deserves. We discuss nontightness in connection with complexity leveraging, HMAC, lattice-based cryptography, identity-based encryption, and hybrid encryption.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید