Sciweavers

1747 search results - page 243 / 350
» Long Range Dependence
Sort
View
AIMS
2007
Springer
15 years 10 months ago
RAQNet: A Topology-Aware Overlay Network
Peer-to-peer overlay networks provide a useful infrastructure for building distributed applications. These networks provide efficient and fault-tolerant routing and object locating...
Seyed Iman Mirrezaei, Javad Shahparian, Mohammad G...
ASIAN
2007
Springer
126views Algorithms» more  ASIAN 2007»
15 years 10 months ago
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Abstract. This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first ord...
Gergei Bana, Koji Hasebe, Mitsuhiro Okada
ATAL
2007
Springer
15 years 10 months ago
Average-case tractability of manipulation in voting via the fraction of manipulators
Recent results have established that a variety of voting rules are computationally hard to manipulate in the worst-case; this arguably provides some guarantee of resistance to man...
Ariel D. Procaccia, Jeffrey S. Rosenschein
117
Voted
CAV
2007
Springer
110views Hardware» more  CAV 2007»
15 years 10 months ago
Hector: Software Model Checking with Cooperating Analysis Plugins
We present Hector, a software tool for combining different abstraction methods to extract sound models of heap-manipulating imperative programs with recursion. Extracted models ma...
Nathaniel Charlton, Michael Huth
COCOON
2007
Springer
15 years 10 months ago
Streaming Algorithms Measured in Terms of the Computed Quantity
The last decade witnessed the extensive studies of algorithms for data streams. In this model, the input is given as a sequence of items passing only once or a few times, and we ar...
Shengyu Zhang