Sciweavers

160 search results - page 5 / 32
» Homomorphism preservation theorems
Sort
View
IFIP
2009
Springer
14 years 2 months ago
Transformations between Cryptographic Protocols
Abstract. A transformation F between protocols associates the messages sent and received by participants in a protocol Π1 with messages sent and received in some Π2. Transformati...
Joshua D. Guttman
LCC
1994
214views Algorithms» more  LCC 1994»
13 years 11 months ago
Preservation Theorems in Finite Model Theory
Eric Rosen, Scott Weinstein
AML
2007
87views more  AML 2007»
13 years 7 months ago
Preservation theorems for bounded formulas
In this paper we naturally define when a theory has bounded quantifier elimination, or is bounded model complete. We give several equivalent conditions for a theory to have each...
Morteza Moniri
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 7 months ago
Mosaic: Policy Homomorphic Network Extension
With the advent of large-scale cloud computing infrastructures, network extension has emerged as a major challenge in the management of modern enterprise networks. Many enterprise...
L. Erran Li, Michael F. Nowlan, Y. R. Yang
ICPR
2006
IEEE
14 years 8 months ago
3D Object Digitization: Topology Preserving Reconstruction
In this paper we derive a sampling theorem, which is the first one to guarantee topology preservation during digitization of 3D objects. This new theorem is applicable to several ...
Longin Jan Latecki, Peer Stelldinger