Microsoft Research Blog

English

  1. A Robust and Verifiable Cryptographically Secure Election Scheme 

    September 1, 1985 | Josh Benaloh and Michael J. Fischer

    This paper describes a cryptographic scheme for holding a secure secret ballot election in which all communication is public. Voters cast their votes electronically, suitably encrypted, and a ā€œgovernmentā€ releases a tally and a proof of its correctness which can be verified by all.

  2. Monadic Second-order Theories 

    August 7, 1985 | Yuri Gurevich

    In this chapter we make a case for the monadic second-order logic (that is to say, for the extension of first-order logic allowing quantification over monadic predicates) as a good source of theories that are both expressive and manageable. We illustrate two powerful decidability techniques…

  3. The Decision Problem for Branching Time Logic 

    August 7, 1985 | Yuri Gurevich and Saharon Shelah

    Define a tree to be any partial order satisfying the following requirement: if (y < x and z < x) then (y < z or y = z or y > z). The main result of the two papers [62, 63] is the decidability of…

  4. A New Thesis 

    August 7, 1985 | Yuri Gurevich

    The first announcement of the "new thesis", latern known as the Abstract State Machine thesis.

  5. Yacc in Sasl — an Exercise in Functional Programming 

    August 1, 1985 | Simon Peyton Jones

    Among the advantages claimed for a purely functional programming style is ease of designing and implementing large programs. However, little experience of actually doing so has been gained so far. The experience of writing a particular medium sized program in a functional language is described…

  6. Large-scale Learning to Rank using Boosted Decision Trees 

    June 2, 1985 | Krysta M. Svore, Christopher J.C. Burges, Chris J.C. Burges, and Krysta M. Svore

    The Web search ranking task has become increasingly important due to the rapid growth of the internet. With the growth of the Web and the number of Web search users, the amount of available training data for learning Web ranking models has also increased. We…

  7. A Zero-one Law for Logic with a Fixed-point Operator 

    April 7, 1985 | Andreas Blass, Yuri Gurevich, and D. Kozen

    The zero-one law, known to hold for first-order logic but not for monadic or even existential monadic second-order logic, is generalized to the extension of first-order logic by the least (or iterative) fixed-point operator. We also show that the problem of deciding, for any pi,…

  8. Secure Communication Using Remote Procedure Calls 

    February 1, 1985 | Andrew Birrell

    Research on encryption-based secure communication protocols has reached a stage where it is feasible to construct end-to-end secure protocols. The design of such a protocol, built as part of a remote procedure call package, is described. The security abstraction presented to users of the package,…