Sciweavers

444 search results - page 21 / 89
» Erdos-Rado without choice
Sort
View
IFM
2005
Springer
14 years 1 months ago
Generating Path Conditions for Timed Systems
We provide an automatic method for calculating the path condition for programs with real time constraints. This method can be used for the semiautomatic verification of a unit of ...
Saddek Bensalem, Doron Peled, Hongyang Qu, Stavros...
ATAL
2004
Springer
14 years 1 months ago
A Protocol for a Distributed Recommender System
We present a domain model and protocol for the exchange of recommendations by selfish agents without the aid of any centralized control. Our model captures a subset of the realiti...
José M. Vidal
PVM
2004
Springer
14 years 29 days ago
A Performance-Oriented Technique for Hybrid Application Development
In SMP clusters it is not always convenient to switch from pure message-passing code to hybrid software designs that exploit shared memory. This paper tackles the problem of restru...
Emilio Mancini, Massimiliano Rak, Roberto Torella,...
CRYPTO
2001
Springer
136views Cryptology» more  CRYPTO 2001»
14 years 3 days ago
Session-Key Generation Using Human Passwords Only
We present session-key generation protocols in a model where the legitimate parties share only a human-memorizable password. The security guarantee holds with respect to probabilis...
Oded Goldreich, Yehuda Lindell
AMAST
2000
Springer
13 years 12 months ago
Behavioural Subtyping Relations for Object-Oriented Formalisms
In this paper we investigate the object-oriented notion of subtyping in the context of behavioural formalisms. Subtyping in OOformalisms is closely related to the concept of inheri...
Clemens Fischer, Heike Wehrheim