Interactive Development of Provably Sound Decision Procedures

نویسنده

  • Silvio Ranise
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Methods of Optimization in Imprecise Data Envelopment Analysis

  In this paper imprecise target models has been proposed to investigate the relation between imprecise data envelopment analysis (IDEA) and mini-max reference point formulations. Through these models, the decision makers' preferences are involved in interactive trade-off analysis procedures in multiple objective linear programming with imprecise data. In addition, the gradient projection type...

متن کامل

Intelligent Exploration of Sound Spaces Using Decision Trees and Evolutionary Approach

This paper describes Synthbee, an assistive tool for sound design which enables musicians to achieve desired sounds without managing parameters of a sound synthesizer manually. The system allows musicians to specify desired sound characteristics using attributes and explore the space of producible sounds by controlling the interactive evolutionary algorithm extended to take into account specifi...

متن کامل

On Simultaneous Two-player Combinatorial Auctions

We consider the following communication problem: Alice and Bob each have some valuation functions v1(·) and v2(·) over subsets ofm items, and their goal is to partition the items into S, S̄ in a way that maximizes the welfare, v1(S)+v2(S̄). We study both the allocation problem, which asks for a welfare-maximizing partition and the decision problem, which asks whether or not there exists a partiti...

متن کامل

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

A Unified Methodology For Constructing Public-Key Encryption Schemes Secure Against Adaptive Chosen-Ciphertext Attack

We introduce a new methodology for achieving security against adaptive chosen-ciphertext attack (CCA) for public-key encryption schemes, which we call the oblivious decryptors model. The oblivious decryptors model generalizes both the two-key model of Naor and Yung, as well the Cramer–Shoup encryption schemes. The key ingredient in our new paradigm is Sahai’s notion of Simulation-Sound NIZK pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007