Skip to main content

Showing 1–9 of 9 results for author: Dougherty, J

Searching in archive cs. Search in all archives.
.
  1. A Coq Formalization of Unification Modulo Exclusive-Or

    Authors: Yichi Xu, Daniel J. Dougherty, Rose Bohrer

    Abstract: Equational Unification is a critical problem in many areas such as automated theorem proving and security protocol analysis. In this paper, we focus on XOR-Unification, that is, unification modulo the theory of exclusive-or. This theory contains an operator with the properties Associativity, Commutativity, Nilpotency, and the presence of an identity. In the proof assistant Coq, we implement an alg… ▽ More

    Submitted 13 February, 2025; originally announced February 2025.

    Comments: In Proceedings ICLP 2024, arXiv:2502.08453

    Journal ref: EPTCS 416, 2025, pp. 267-273

  2. arXiv:2410.23955  [pdf, other

    eess.AS cs.LG

    An Empirical Analysis of Speech Self-Supervised Learning at Multiple Resolutions

    Authors: Theo Clark, Benedetta Cevoli, Eloy de Jong, Timofey Abramski, Jamie Dougherty

    Abstract: Self-supervised learning (SSL) models have become crucial in speech processing, with recent advancements concentrating on developing architectures that capture representations across multiple timescales. The primary goal of these multi-scale architectures is to exploit the hierarchical nature of speech, where lower-resolution components aim to capture representations that align with increasingly a… ▽ More

    Submitted 31 October, 2024; originally announced October 2024.

    ACM Class: I.2.0

  3. arXiv:2311.13692  [pdf, ps, other

    cs.CR

    Molly: A Verified Compiler for Cryptoprotocol Roles

    Authors: Daniel J. Dougherty, Joshua D. Guttman

    Abstract: Molly is a program that compiles cryptographic protocol roles written in a high-level notation into straight-line programs in an intermediate-level imperative language, suitable for implementation in a conventional programming language. We define a denotational semantics for protocol roles based on an axiomatization of the runtime. A notable feature of our approach is that we assume that encryptio… ▽ More

    Submitted 22 November, 2023; originally announced November 2023.

  4. arXiv:2002.08111  [pdf, other

    cs.LG cs.CV cs.NE stat.ML

    Hierarchical Quantized Autoencoders

    Authors: Will Williams, Sam Ringer, Tom Ash, John Hughes, David MacLeod, Jamie Dougherty

    Abstract: Despite progress in training neural networks for lossy image compression, current approaches fail to maintain both perceptual quality and abstract features at very low bitrates. Encouraged by recent success in learning discrete representations with Vector Quantized Variational Autoencoders (VQ-VAEs), we motivate the use of a hierarchy of VQ-VAEs to attain high factors of compression. We show that… ▽ More

    Submitted 16 October, 2020; v1 submitted 19 February, 2020; originally announced February 2020.

  5. arXiv:1804.07158  [pdf, ps, other

    cs.CR

    Homomorphisms and Minimality for Enrich-by-Need Security Analysis

    Authors: Daniel J. Dougherty, Joshua D. Guttman, John D. Ramsdell

    Abstract: Cryptographic protocols are used in different environments, but existing methods for protocol analysis focus only on the protocols, without being sensitive to assumptions about their environments. LPA is a tool which analyzes protocols in context. LPA uses two programs, cooperating with each other: CPSA, a well-known system for protocol analysis, and Razor, a model-finder based on SMT technology.… ▽ More

    Submitted 19 April, 2018; originally announced April 2018.

  6. arXiv:1404.3899  [pdf, ps, other

    cs.CR

    A Hybrid Analysis for Security Protocols with State

    Authors: John D. Ramsdell, Daniel J. Dougherty, Joshua D. Guttman, Paul D. Rowe

    Abstract: Cryptographic protocols rely on message-passing to coordinate activity among principals. Each principal maintains local state in individual local sessions only as needed to complete that session. However, in some protocols a principal also uses state to coordinate its different local sessions. Sometimes the non-local, mutable state is used as a means, for example with smart cards or Trusted Platfo… ▽ More

    Submitted 16 June, 2014; v1 submitted 15 April, 2014; originally announced April 2014.

  7. arXiv:1202.2168  [pdf, ps, other

    cs.CR

    Symbolic Protocol Analysis for Diffie-Hellman

    Authors: Daniel J. Dougherty, Joshua D. Guttman

    Abstract: We extend symbolic protocol analysis to apply to protocols using Diffie-Hellman operations. Diffie-Hellman operations act on a cyclic group of prime order, together with an exponentiation operator. The exponents form a finite field. This rich algebraic structure has resisted previous symbolic approaches. We work in an algebra defined by the normal forms of a rewriting theory (modulo associativity… ▽ More

    Submitted 9 February, 2012; originally announced February 2012.

  8. arXiv:1003.5350  [pdf, ps, other

    cs.DB cs.LO cs.PL

    An Improved Algorithm for Generating Database Transactions from Relational Algebra Specifications

    Authors: Daniel J. Dougherty

    Abstract: Alloy is a lightweight modeling formalism based on relational algebra. In prior work with Fisler, Giannakopoulos, Krishnamurthi, and Yoo, we have presented a tool, Alchemy, that compiles Alloy specifications into implementations that execute against persistent databases. The foundation of Alchemy is an algorithm for rewriting relational algebra formulas into code for database transactions. In th… ▽ More

    Submitted 28 March, 2010; originally announced March 2010.

    Journal ref: EPTCS 21, 2010, pp. 77-89

  9. arXiv:cs/0407017  [pdf, ps, other

    cs.DC

    A Low Cost Distributed Computing Approach to Pulsar Searches at a Small College

    Authors: Andrew Cantino, Fronefield Crawford, Saurav Dhital, John P. Dougherty, Reid Sherman

    Abstract: We describe a distributed processing cluster of inexpensive Linux machines developed jointly by the Astronomy and Computer Science departments at Haverford College which has been successfully used to search a large volume of data from a recent radio pulsar survey. Analysis of radio pulsar surveys requires significant computational resources to handle the demanding data storage and processing nee… ▽ More

    Submitted 7 July, 2004; originally announced July 2004.

    Comments: Adapted from a talk given at the Eleventh SIAM Conference on Parallel Computing, February 25-27, 2004 in San Francisco, CA. 18 pages, including 3 figures and 2 tables

    ACM Class: J.2