نتایج جستجو برای: aldin asad abadi

تعداد نتایج: 1078  

A Amiri GH Rostampour Mehdi Nikoo Mohammad Nikoo, T Babaeinejad

Rivers are important as the main source of supply for drinking, agriculture and industry.However, drinking water quality in terms of qualitative parameters, is the most important variable. Studias and predicting  changes in quality parameters along a river, are one of the goals of water resources planners and managers. In this regard, many water quality models in order to maintain better water ...

ژورنال: مجله علمی پژوهان 2018
رستمی, پریسا, شریفی, مهناز, محمدی, زیبا, مرادی, علی, مکوندی, زینب,

Background and Objectives:  Cervical cancer is a major health problem in Iranian women. The aim of this study was to assess the status of cervical cancer screening and its barriers in women referred to the health centers of Asad Abad. Materials and Methods: In this descriptive-analytic study, 200 married women aged 18-50 years old referred to Asad Abad comprehensive health centers were se...

2007
Jan Schwinghammer

We present a procedure for computing normal forms of terms in Abadi and Cardelli’s functional object calculus. Even when equipped with simple types, terms of this calculus are not terminating in general, and we draw on recent ideas about the normalization by evaluation paradigm for the untyped lambda calculus. Technically, we work in the framework of Shinwell and Pitts’ FM-domain theory, which ...

2005
Michael Stonebraker Daniel J. Abadi Adam Batkin Xuedong Chen Mitch Cherniack Miguel Ferreira Edmond Lau Amerson Lin Samuel Madden Elizabeth J. O'Neil Patrick E. O'Neil Alexander Rasin Nga Tran Stanley B. Zdonik

• C-Store: A Column-oriented DBMS* Mike Stonebraker, Daniel J. Abadi, Adam Batkin, Xuedong Chen, Mitch Cherniack, Miguel Ferreira, Edmond Lau, Amerson Lin, Sam Madden, Elizabeth O’Neil, Pat O’Neil, Alex Rasin, Nga Tran, Stan Zdonik. Appears in Proceedings of the ACM Conference on Very Large Databases(VLDB), 2005 • Database Cracking+ Stratos Idreos, Martin L. Kersten, and Stefan Manegold. Appear...

2006
Flavio D. Garcia Peter van Rossum

This paper provides one more step towards bridging the gap between the formal and computational approaches to the verification of cryptographic protocols. We extend the well-known Abadi-Rogaway logic with probabilistic hashes and we give a precise semantic interpretation to it using Canetti’s oracle hashes. These are probabilistic polynomialtime hashes that hide all partial information. Finally...

Journal: :Information & Software Technology 2001
John A. Clark Jeremy L. Jacob

Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspects in a uniform way based on combinatorial optimisation techniques. The belief logic of Burrows, Abadi and Needham (BAN logic) is viewed as both a specification and proof system and as a ‘protocol programming language’. The paper shows how simulated annealing and genetic alg...

1998
Didier Rémy

We extend the Abadi-Cardelli calculus of primitive objects with object extension. We enrich object types with a more precise, uniform, and exible type structure. This enables to type object extension under both width and depth subtyping. Objects may also have extend-only or virtual contra-variant methods and read-only co-variant methods. The resulting subtyping relation is richer, and types of ...

2003
Ondřej Ryšavý

Formal specification language and deduction system for object-oriented models is proposed in this article. It extends ς-calculus introduced by Martín Abadi and Luca Cardelli with propositional connectives, and quantified terms. The first-order type system of ς-calculus serves as typing theory of suggested calculus. Deduction system consists of reduction rules of ς-terms, equality theory of ς-ca...

2007
Ricardo Corin

We formalize Abadi and Rogaway's computational soundness result in the Coq interactive theorem prover. This requires to model notions of provable cryptography like indistinguishability between ensembles of probability distributions, PPT reductions, and security notions for encryption schemes. Our formalization is the rst computational soundness result to be mechanized, and it shows the feasibil...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید