Filters








2,246,931 Hits in 6.3 sec

The Correctness of Set-Sharing [chapter]

Patricia M. Hill, Roberto Bagnara, Enea Zaffanella
1998 Lecture Notes in Computer Science  
This paper provides a generalisation of the abstraction function for Sharing that can be applied to any language, with or without the occur-check.  ...  of the safeness property assumed the occur-check.  ...  Introduction Today, talking about sharing analysis for logic programs is almost the same as talking about the set-sharing domain Sharing of Jacobs and Langen 8, 9] .  ... 
doi:10.1007/3-540-49727-7_6 fatcat:7dyabw2wqrh6rnwkmkwbhfugby

A correct, precise and efficient integration of set-sharing, freeness and linearity for the analysis of finite and rational tree languages [article]

Patricia M. Hill, Enea Zaffanella, Roberto Bagnara
2004 arXiv   pre-print
We provide a new abstraction function and prove the correctness of the analysis for both the finite tree and the rational tree cases.  ...  In this paper we present a novel combination of set-sharing with freeness and linearity information, which is characterized by an improved abstract unification operator.  ...  Acknowledgment We recognize the hard work required to review technical papers such as this one and would like to express our real gratitude to the Journal referees for their critical reading and constructive  ... 
arXiv:cs/0401021v1 fatcat:6dmu2sg6obh3njznazfyitjr6i

A correct, precise and efficient integration of set-sharing, freeness and linearity for the analysis of finite and rational tree languages

PATRICIA M. HILL, ENEA ZAFFANELLA, ROBERTO BAGNARA
2004 Theory and Practice of Logic Programming  
In this paper we present a novel combination of set-sharing with freeness and linearity information, which is characterized by an improved abstract unification operator.  ...  We provide a new abstraction function and prove the correctness of the analysis for both the finite tree and the rational tree cases.  ...  An element of the set-sharing domain (a sharing set) is a set of subsets of VI (the sharing groups). Note that the empty set is not a sharing group.  ... 
doi:10.1017/s1471068403001868 fatcat:eypsikealzfnjnqs6lntrateba

Correction: Examining the construct and known-group validity of a composite endpoint for The Older Persons and Informal Caregivers Survey Minimum Data Set (TOPICS-MDS); A large-scale data sharing initiative

Cynthia S. Hofman, Jennifer E. Lutomski, Han Boter, Bianca M. Buurman, Anton J. M. de Craen, Rogier Donders, Marcel G. M. Olde Rikkert, Peter Makai, René J. F. Melis
2018 PLoS ONE  
Public sharing of data is restricted per the Data Use Agreement.  ...  Caregivers Survey Minimum Data Set (TOPICS-MDS); A large-scale data sharing initiative. group validity of a composite endpoint for The Older Persons and Informal Caregivers Survey Minimum Data Set (TOPICS-MDS  ... 
doi:10.1371/journal.pone.0196316 pmid:29684918 pmcid:PMC5912928 fatcat:zh6pvt6ayjahtnj2ktlsqmoaiu

APSS

Lidong Zhou, Fred B. Schneider, Robbert Van Renesse
2005 ACM Transactions on Privacy and Security  
The protocol enables a set of secret shares to be periodically refreshed with a new, independent set, thereby thwarting mobile-adversary attacks.  ...  SYSTEM MODEL AND CORRECTNESS Consider a system comprising a set of n servers that hold shares of a secret and communicate through a network. At any time, a server is either correct or compromised.  ...  All correct servers must select and use subshares of the same set of subsharings in order to generate a new sharing for the same secret as the old one.  ... 
doi:10.1145/1085126.1085127 fatcat:tu6fpr2fmnao3lpisp7pu7yuoa

Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding Theory

Ryutaroh Matsumoto
2018 2018 International Symposium on Information Theory and Its Applications (ISITA)  
One example of such schemes was recently reported whose access structure cannot be realized by any secret sharing schemes with classical shares.  ...  We consider secret sharing schemes with a classical secret and quantum shares.  ...  Acknowledgment This research is partly supported by the JSPS Grant No. 26289116.  ... 
doi:10.23919/isita.2018.8664271 dblp:conf/isita/Matsumoto18 fatcat:tupqy3yjj5eq5f6ssmmmz2hw4m

Graceful Degradation in Multi-Party Computation (Extended Abstract) [chapter]

Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub
2011 Lecture Notes in Computer Science  
collection of subsets of the player set, where the adversary can corrupt the players in one of these subsets [HM97].  ...  This strictly generalizes known results on hybrid security and mixed adversaries. rity means that secrecy of the inputs and correctness of the output are maintained even when some of the parties are dishonest  ...  We derived tight bounds for the existence of perfectly secure MPC protocols for the given settings, and provided protocols that achieve these bounds.  ... 
doi:10.1007/978-3-642-20728-0_15 fatcat:3owrpabzsbgatcfqjn4vmsuaza

Efficient MPC with a Mixed Adversary

Martin Hirt, Marta Mularczyk, Daniel Wichs, Adam D. Smith, Yael Tauman Kalai
2020 Conference on Information-Theoretic Cryptography  
Surprisingly, since the presentation of the feasibility result for the mixed setting, no progress has been made in terms of efficiency: the state-of-the-art protocol still requires a communication of Ω  ...  In this paper, we present a perfectly-secure MPC protocol for the mixed setting with essentially the same efficiency as the best MPC protocols for the active-only setting.  ...  Another important problem is to construct a protocol for the mixed setting, that does not have the additive factor D · p(n) in the communication complexity.  ... 
doi:10.4230/lipics.itc.2020.3 dblp:conf/icits/HirtM20 fatcat:t3obgeftwvfcpj47is7kmmyoty

Equivalence between sharing quantum and classical secrets and error correction

Anne Marin, Damian Markham
2013 Physical Review A. Atomic, Molecular, and Optical Physics  
In this framework we show the equivalence of existence of both schemes, that is, the existence of a scheme sharing a quantum secret implies the extended classical secret sharing scheme works, and vice  ...  These results also provide a new way of searching for quantum error correcting codes.  ...  ACKNOWLEDGEMENTS We gratefully acknowledge discussions on the topics of this research with Simon Perdrix, Gilles Zemor.  ... 
doi:10.1103/physreva.88.042332 fatcat:n256svpylrdari5n4lkht3an4i

The First QALB Shared Task on Automatic Text Correction for Arabic

Behrang Mohit, Alla Rozovskaya, Nizar Habash, Wajdi Zaghouani, Ossama Obeid
2014 Proceedings of the EMNLP 2014 Workshop on Arabic Natural Language Processing (ANLP)  
We present a summary of the first shared task on automatic text correction for Arabic text.  ...  The shared task received 18 systems submissions from nine teams in six countries and represented a diversity of approaches.  ...  Acknowledgments We would like to thank the organizing committee of EMNLP-2014 and its Arabic NLP workshop and also the shared task participants for their ideas and support.  ... 
doi:10.3115/v1/w14-3605 dblp:conf/wanlp/MohitRHZO14 fatcat:dxqxwaslwvearfifspobvrq6sm

An Integrated Distributed Storage Design Offering Data Retrievability and Recoverability Using Soft Decision Decoding of Block Codes

C. K. Shyamala, T. R. Padmanabhan
2015 Journal of Computing and Information Technology  
We address the issues of concurrency, consistency, dynamic data support, data share repair, and trust management in providing persistent storage and access.  ...  Further, since storage durability suffers in untrusted and unreliable environments, it becomes crucial to (a) select the most reliable set of servers to assure data retrievability and (b) dynamically identify  ...  Correct fragment set: k-correct = correct fragment shares being the no. of correct fragment shares in K-fragment that are required for file reconstruction. F(r−u−w) is (k), Here, 1.  ... 
doi:10.2498/cit.1002490 fatcat:wbkmoucshvd2tfznx3hkccvsuy

Corrections to the Parameterization of Constraints on Allele Sharing in Sibling Pairs Alter Covariate-Parameter Estimates but Not Sharing-Probability Estimates or Power of Tests for Linkage

Celia M.T. Greenwood, Shelley B. Bull
2005 American Journal of Human Genetics  
Genet. 76:187-189, 2005 Corrections to the Parameterization of Constraints on Allele Sharing in Sibling Pairs Alter Covariate-Parameter Estimates but Not Sharing-Probability Estimates or Power of Tests  ...  After correction, no data sets were excluded.  ... 
doi:10.1086/427225 pmid:15580549 pmcid:PMC1196424 fatcat:ekwq4fovwjb45gxi32yo5mztae

Grammatical error correction using hybrid systems and type filtering

Mariano Felice, Zheng Yuan, Øistein E. Andersen, Helen Yannakoudakis, Ekaterina Kochmar
2014 Proceedings of the Eighteenth Conference on Computational Natural Language Learning: Shared Task  
Our best hybrid system achieves state-of-the-art results, ranking first on the original test set and second on the test set with alternative annotations.  ...  This paper describes our submission to the CoNLL 2014 shared task on grammatical error correction using a hybrid approach, which includes both a rule-based and an SMT system augmented by a large webbased  ...  Acknowledgements We would like to thank Marek Rei for his valuable feedback and suggestions as well as Cambridge English Language Assessment, a division of Cambridge Assessment, for supporting this research  ... 
doi:10.3115/v1/w14-1702 dblp:conf/conll/FeliceYAYK14 fatcat:zhjtcdyg3nggxb54s4ouhgl5bu

On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes [chapter]

Ventzislav Nikov, Svetla Nikova
2006 Lecture Notes in Computer Science  
Acknowledgements The authors would like to thank Henk van Tilborg for the valuable comments and remarks.  ...  and we prove the error-correcting capability of the error-set correcting interleaving codes.  ...  Next we redefine the packing problem for the new settings and generalize the notion of error-correcting capability of the error-set correcting codes accordingly (taking into account the new metric and  ... 
doi:10.1007/11779360_22 fatcat:i3yb4an6zza77cfvwrwifmvhjy

The Second QALB Shared Task on Automatic Text Correction for Arabic

Alla Rozovskaya, Houda Bouamor, Nizar Habash, Wajdi Zaghouani, Ossama Obeid, Behrang Mohit
2015 Proceedings of the Second Workshop on Arabic Natural Language Processing  
We present a summary of QALB-2015, the second shared task on automatic text correction of Arabic texts.  ...  The shared task extends QALB-2014, which focused on correcting errors in Arabic texts produced by native speakers of Arabic.  ...  Overall, QALB-2015 generated a diverse set of approaches for automatic text correction of Arabic. The rest of the paper is organized as follows. In Section 2, we present the shared task framework.  ... 
doi:10.18653/v1/w15-3204 dblp:conf/wanlp/RozovskayaBHZOM15 fatcat:cicjpkirgzdnhar4cxulnsjhxm
« Previous Showing results 1 — 15 out of 2,246,931 results