Sciweavers

5665 search results - page 16 / 1133
» Introduction to Computer Security
Sort
View

Publication
214views
15 years 5 months ago
Analysis and Modeling of Traffic in Modern Data Communication Networks
In performance analysis and design of communication netword modeling data traffic is important. With introduction of new applications, the characteristics of the data traffic chang...
G. Babic, B. Vandalore, and R. Jain
RTA
2007
Springer
14 years 1 months ago
Proving Termination of Rewrite Systems Using Bounds
The use of automata techniques to prove the termination of string rewrite systems and left-linear term rewrite systems is advocated by Geser et al. in a recent sequence of papers. ...
Martin Korp, Aart Middeldorp
TLCA
2007
Springer
14 years 1 months ago
Completing Herbelin's Programme
Abstract. In 1994 Herbelin started and partially achieved the programme of showing that, for intuitionistic implicational logic, there is a Curry-Howard interpretation of sequent c...
José Espírito Santo
BIRTHDAY
2006
Springer
13 years 11 months ago
Horizontal Composability Revisited
We recall the contribution of Goguen and Burstall's 1980 CAT paper and its powerful influence on theories of specification implementation that were emerging at about the same ...
Donald Sannella, Andrzej Tarlecki