Browsing Theoretical Computer Science Group by Issue Date
Now showing items 1-20 of 25
-
Full abstraction for PCF
(2000-12-15) -
Self-composition by Symbolic Execution
(Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, 2013)Self-composition is a logical formulation of non-interference, a high-level security property that guarantees the absence of illicit information leakages through executing programs. In order to capture program executions, ... -
Abstract Model Counting: A Novel Approach for Quantification of Information Leaks
(ACM, 2014)We present a novel method for Quantitative Information Flow analysis. We show how the problem of computing information leakage can be viewed as an extension of the Satisfiability Modulo Theories (SMT) problem. This view ... -
Quantifying Information Leaks Using Reliability Analysis
(ACM, 2014)We report on our work-in-progress into the use of reliability analysis to quantify information leaks. In recent work we have proposed a software reliability analysis technique that uses symbolic execution and model counting ... -
Concurrent Bounded Model Checking
(ACM, 2015-02) -
smid: A Black-Box Program Driver
(2016) -
Nominal Game Semantics.
(2016) -
A Case Study of Controlling Crossover in a Selection Hyper-heuristic Framework Using the Multidimensional Knapsack Problem.
(2016)Hyper-heuristics are high-level methodologies for solving complex problems that operate on a search space of heuristics. In a selection hyper-heuristic framework, a heuristic is chosen from an existing set of low-level ... -
A Case Study of Controlling Crossover in a Selection Hyper-heuristic Framework Using the Multidimensional Knapsack Problem
(MIT Press, 2016-03)Hyper-heuristics are high-level methodologies for solving complex problems that operate on a search space of heuristics. In a selection hyper-heuristic framework, a heuristic is chosen from an existing set of low-level ... -
Exploring Human Cognition Using Large Image Databases.
(2016-07)Most cognitive psychology experiments evaluate models of human cognition using a relatively small, well-controlled set of stimuli. This approach stands in contrast to current work in neuroscience, perception, and computer ... -
Block Structure vs. Scope Extrusion: Between Innocence and Omniscience
(IfCoLog (International Federation of Computational Logic), 2016-08-17)We study the semantic meaning of block structure using game semantics and introduce the notion of block-innocent strategies, which turns out to characterise call-by-value computation with block-allocated storage through ... -
Support Vector Motion Clustering
(2017-11) -
Introduction to Categories and Categorical Logic
The aim of these notes is to provide a succinct, accessible introduction to some of the basic ideas of category theory and categorical logic. The notes are based on a lecture course given at Oxford over the past few years. ...