Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Joachim Breitner"'
Autor:
Maciej Skorski, Joachim Breitner
Publikováno v:
ISIT
Determining entropy rates of stochastic processes is a fundamental but difficult problem, with closed-form solutions known only for specific cases. This paper pushes the state-of-the-art by solving the problem for Hidden Markov Models (HMMs) and Reny
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7a5d1042ecb083e1af9b45346297a63a
http://orbilu.uni.lu/handle/10993/45875
http://orbilu.uni.lu/handle/10993/45875
Autor:
Stephanie Weirich, Yao Li, Christine Rizkallah, Antal Spector-Zabusky, John Wiegley, Joachim Breitner
Publikováno v:
Proceedings of the ACM on Programming Languages. 2:1-16
Good tools can bring mechanical verification to programs written in mainstream functional languages. We use hs-to-coq to translate significant portions of Haskell’s containers library into Coq, and verify it against specifications that we derive fr
Autor:
Joachim Breitner
Publikováno v:
Computer Languages, Systems & Structures. 52:65-91
Publikováno v:
Journal of Computer Security. 26:335-366
Autor:
Joachim Breitner, Chris Smith
Publikováno v:
Proceedings of the ACM on Programming Languages. 1:1-15
Implementing multi-player networked games by broadcasting the player’s input and letting each client calculate the game state -- a scheme known as *lock-step simulation* – is an established technique. However, ensuring that every client in this s
Autor:
Joachim Breitner
Publikováno v:
Proceedings of the 7th ACM SIGPLAN International Workshop on Functional Art, Music, Modeling, and Design.
Kaleidogen lets you breed abstract circular patterns. You can crossbreed two and add their offspring to your stock. The game has no end, no score, no time pressure, the only goal is to please your personal sense of aesthetics. The mechanisms behind K
Autor:
Nadia Heninger, Joachim Breitner
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783030321000
Financial Cryptography
Financial Cryptography
In this paper, we compute hundreds of Bitcoin private keys and dozens of Ethereum, Ripple, SSH, and HTTPS private keys by carrying out cryptanalytic attacks against digital signatures contained in public blockchains and Internet-wide scans. The ECDSA
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::00ee73921c1f353ac753daa2c80e3268
https://doi.org/10.1007/978-3-030-32101-7_1
https://doi.org/10.1007/978-3-030-32101-7_1
Publikováno v:
Haskell@ICFP
Equational reasoning is one of the key features of pure functional languages such as Haskell. To date, however, such reasoning always took place externally to Haskell, either manually on paper, or mechanised in a theorem prover. This article shows ho
Autor:
Joachim Breitner
Publikováno v:
Haskell@ICFP
Occasionally, developers need to ensure that the compiler treats their code in a specific way that is only visible by inspecting intermediate or final compilation artifacts. This is particularly common with carefully crafted compositional libraries,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::561adf4715036ff583df88d0bb5d8cb1
http://arxiv.org/abs/1803.07130
http://arxiv.org/abs/1803.07130
Publikováno v:
CPP
We would like to use the Coq proof assistant to mechanically verify properties of Haskell programs. To that end, we present a tool, named hs-to-coq, that translates total Haskell programs into Coq programs via a shallow embedding. We apply our tool i