Sciweavers

933 search results - page 173 / 187
» Extending Forward Checking
Sort
View
CONCUR
2000
Springer
14 years 1 days ago
Reachability Analysis for Some Models of Infinite-State Transition Systems
We introduce some new models of infinite-state transition systems. The basic model, called a (reversal-bounded) counter machine (CM), is a nondeterministic finite automaton augment...
Oscar H. Ibarra, Tevfik Bultan, Jianwen Su
SIGCOMM
1991
ACM
13 years 12 months ago
IP-Based Protocols for Mobile Internetworking
We consider the problem of providing network access to hosts whose physical location changes with time. Such hosts cannot depend on traditional forms of network connectivity and r...
John Ioannidis, Dan Duchamp, Gerald Q. Maguire Jr.
CTRSA
2008
Springer
137views Cryptology» more  CTRSA 2008»
13 years 10 months ago
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange
Public key based authentication and key exchange protocols are not usually designed with privacy in mind and thus involve cleartext exchanges of identities and certificates before ...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
EUSFLAT
2001
180views Fuzzy Logic» more  EUSFLAT 2001»
13 years 9 months ago
Fuzzy approach to meta-analysis
Meta-analysis is a statistical procedure to do syntheses of evidences. In the production of scientific knowledge, in spite of paradigmatic skips of quality, the rising of the accu...
Paulo Alfonso Bracarense Costa, Rogério Cid...
IJCAI
2003
13 years 9 months ago
Temporal Reasoning with Preferences and Uncertainty
Temporal Constraint Satisfaction Problems allow for reasoning with events happening over time. Their expressiveness has been extended independently in two directions: to account f...
Neil Yorke-Smith, Kristen Brent Venable, Francesca...