Sciweavers

1139 search results - page 26 / 228
» Bounded Ideation Theory
Sort
View
ICALP
2005
Springer
14 years 2 months ago
Combining Intruder Theories
Abstract. Most of the decision procedures for symbolic analysis of protocols are limited to a fixed set of algebraic operators associated with a fixed intruder theory. Examples o...
Yannick Chevalier, Michaël Rusinowitch
ICNP
1998
IEEE
14 years 15 days ago
Flow Theory: An Enhancement
Flow Theory is a rich, effective theory introduced in order to study real-time network protocols. It is based on discrete mathematics in which a flow of data is represented by an ...
Alfio Lombardo, Giacomo Morabito, Sergio Palazzo, ...
MOBIHOC
2007
ACM
14 years 8 months ago
Bounds for the capacity of wireless multihop networks imposed by topology and demand
Existing work on the capacity of wireless networks predominantly considers homogeneous random networks with random work load. The most relevant bounds on the network capacity, e.g...
Alireza Keshavarz-Haddad, Rudolf H. Riedi
AML
2005
104views more  AML 2005»
13 years 8 months ago
Weak theories of linear algebra
Abstract. We investigate the theories LA, LAP, LAP of linear algebra, which were originally defined to study the question of whether commutativity of matrix inverses has polysize F...
Neil Thapen, Michael Soltys
CORR
2008
Springer
104views Education» more  CORR 2008»
13 years 9 months ago
Coalgebraic Automata Theory: Basic Results
Abstract. We generalize some of the central results in automata theory to the abstraction level of coalgebras and thus lay out the foundations of a universal theory of automata ope...
Clemens Kupke, Yde Venema