Skip to main content

Showing 1–8 of 8 results for author: Seidel, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.16617  [pdf, ps, other

    cs.CR cs.CY cs.IT cs.SI math.LO

    Security Science (SecSci), Basic Concepts and Mathematical Foundations

    Authors: Dusko Pavlovic, Peter-Michael Seidel

    Abstract: This textbook compiles the lecture notes from security courses taught at Oxford in the 2000s, at Royal Holloway in the 2010s, and currently in Hawaii. The early chapters are suitable for a first course in security. The middle chapters have been used in advanced courses. Towards the end there are also some research problems.

    Submitted 23 April, 2025; originally announced April 2025.

    Comments: 173 Pages, 67 Figures and Tables

    MSC Class: 03-01; 03C65; 68M25 ACM Class: D.4.6; F.4.1; F.4.3; G.0; H.1; K.4.2; K.6.5

  2. arXiv:2303.15163  [pdf

    econ.GN cs.CY cs.HC cs.SI

    How creative versus technical constraints affect individual learning in an online innovation community

    Authors: Victor P. Seidel, Christoph Riedl

    Abstract: Online innovation communities allow for a search for novel solutions within a design space bounded by constraints. Past research has focused on the effect of creative constraints on individual projects, but less is known about how constraints affect learning from repeated design submissions and the effect of the technical constraints that are integral to online platforms. How do creative versus te… ▽ More

    Submitted 27 March, 2023; originally announced March 2023.

    ACM Class: J.4; J.5

  3. Privacy protocols

    Authors: Jason Castiglione, Dusko Pavlovic, Peter-Michael Seidel

    Abstract: Security protocols enable secure communication over insecure channels. Privacy protocols enable private interactions over secure channels. Security protocols set up secure channels using cryptographic primitives. Privacy protocols set up private channels using secure channels. But just like some security protocols can be broken without breaking the underlying cryptography, some privacy protocols c… ▽ More

    Submitted 11 April, 2019; originally announced April 2019.

    Comments: 38 pages, 6 figures

    MSC Class: 68M11; 68M12; 18BN35 ACM Class: C.2.2; C.2.3; D.4.6; H.4.3; I.2.11; K.4.4; K.6.5

    Journal ref: Lecture Notes in Computer Science, vol 11565, Springer 2019, pp. 167-192

  4. Quotients in monadic programming: Projective algebras are equivalent to coalgebras

    Authors: Dusko Pavlovic, Peter-Michael Seidel

    Abstract: In monadic programming, datatypes are presented as free algebras, generated by data values, and by the algebraic operations and equations capturing some computational effects. These algebras are free in the sense that they satisfy just the equations imposed by their algebraic theory, and remain free of any additional equations. The consequence is that they do not admit quotient types. This is, of… ▽ More

    Submitted 13 April, 2017; v1 submitted 26 January, 2017; originally announced January 2017.

    Comments: 31 pages, 21 diagram; in this version: fixed typos; short version in LICS 2017

    MSC Class: 18C15; 18C20; 68Q55 ACM Class: F.3.3; D.3.3

    Journal ref: ACM/IEEE Symposia on Logic in Computer Science (LICS), 32, IEEE 2017, pp. 1-12

  5. arXiv:1605.06719  [pdf, ps, other

    quant-ph cs.LO math-ph math.CT

    (Modular) Effect Algebras are Equivalent to (Frobenius) Antispecial Algebras

    Authors: Dusko Pavlovic, Peter-Michael Seidel

    Abstract: Effect algebras are one of the generalizations of Boolean algebras proposed in the quest for a quantum logic. Frobenius algebras are a tool of categorical quantum mechanics, used to present various families of observables in abstract, often nonstandard frameworks. Both effect algebras and Frobenius algebras capture their respective fragments of quantum mechanics by elegant and succinct axioms; and… ▽ More

    Submitted 3 January, 2017; v1 submitted 21 May, 2016; originally announced May 2016.

    Comments: In Proceedings QPL 2016, arXiv:1701.00242

    Journal ref: EPTCS 236, 2017, pp. 145-160

  6. arXiv:1503.03185  [pdf, ps, other

    cs.GT

    Testing Randomness by Matching Pennies

    Authors: Dusko Pavlovic, Peter-Michael Seidel, Muzamil Yahia

    Abstract: In the game of Matching Pennies, Alice and Bob each hold a penny, and at every tick of the clock they simultaneously display the head or the tail sides of their coins. If they both display the same side, then Alice wins Bob's penny; if they display different sides, then Bob wins Alice's penny. To avoid giving the opponent a chance to win, both players seem to have nothing else to do but to randoml… ▽ More

    Submitted 2 February, 2018; v1 submitted 11 March, 2015; originally announced March 2015.

    Comments: 19 pages, 1 table; in this version: added proofs and explanations

    MSC Class: 91A26; 68Q32 ACM Class: I.2.6

  7. arXiv:1208.6523  [pdf, other

    cs.CV cs.CG cs.DM

    Combinatorial Gradient Fields for 2D Images with Empirically Convergent Separatrices

    Authors: Jan Reininghaus, David Günther, Ingrid Hotz, Tino Weinkauf, Hans Peter Seidel

    Abstract: This paper proposes an efficient probabilistic method that computes combinatorial gradient fields for two dimensional image data. In contrast to existing algorithms, this approach yields a geometric Morse-Smale complex that converges almost surely to its continuous counterpart when the image resolution is increased. This approach is motivated using basic ideas from probability theory and builds up… ▽ More

    Submitted 31 August, 2012; originally announced August 2012.

    Comments: 17 pages, 7 figures

    MSC Class: 68U10

  8. arXiv:1110.4675  [pdf, ps, other

    cs.LO cs.AR cs.MS

    Formal Verification of an Iterative Low-Power x86 Floating-Point Multiplier with Redundant Feedback

    Authors: Peter-Michael Seidel

    Abstract: We present the formal verification of a low-power x86 floating-point multiplier. The multiplier operates iteratively and feeds back intermediate results in redundant representation. It supports x87 and SSE instructions in various precisions and can block the issuing of new instructions. The design has been optimized for low-power operation and has not been constrained by the formal verification… ▽ More

    Submitted 20 October, 2011; originally announced October 2011.

    Comments: In Proceedings ACL2 2011, arXiv:1110.4473

    ACM Class: F.3.1

    Journal ref: EPTCS 70, 2011, pp. 70-83