Sciweavers

160 search results - page 5 / 32
» Homomorphism preservation theorems
Sort
View
128
Voted
IFIP
2009
Springer
15 years 10 months ago
Transformations between Cryptographic Protocols
Abstract. A transformation F between protocols associates the messages sent and received by participants in a protocol Π1 with messages sent and received in some Π2. Transformati...
Joshua D. Guttman
LCC
1994
214views Algorithms» more  LCC 1994»
15 years 7 months ago
Preservation Theorems in Finite Model Theory
Eric Rosen, Scott Weinstein
116
Voted
AML
2007
87views more  AML 2007»
15 years 3 months ago
Preservation theorems for bounded formulas
In this paper we naturally define when a theory has bounded quantifier elimination, or is bounded model complete. We give several equivalent conditions for a theory to have each...
Morteza Moniri
130
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 3 months ago
Mosaic: Policy Homomorphic Network Extension
With the advent of large-scale cloud computing infrastructures, network extension has emerged as a major challenge in the management of modern enterprise networks. Many enterprise...
L. Erran Li, Michael F. Nowlan, Y. R. Yang
ICPR
2006
IEEE
16 years 4 months ago
3D Object Digitization: Topology Preserving Reconstruction
In this paper we derive a sampling theorem, which is the first one to guarantee topology preservation during digitization of 3D objects. This new theorem is applicable to several ...
Longin Jan Latecki, Peer Stelldinger