Sciweavers

1154 search results - page 176 / 231
» Mathematizing C concurrency
Sort
View
MMMACNS
2001
Springer
14 years 1 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
ISPD
1998
ACM
101views Hardware» more  ISPD 1998»
14 years 1 months ago
Greedy wire-sizing is linear time
—The greedy wire-sizing algorithm (GWSA) has been experimentally shown to be very efficient, but no mathematical analysis on its convergence rate has ever been reported. In this...
Chris C. N. Chu, D. F. Wong
WG
1998
Springer
14 years 1 months ago
Triangles in Euclidean Arrangements
The number of triangles in arrangements of lines and pseudolines has been object of some research. Most results, however, concern arrangements in the projective plane. In this arti...
Stefan Felsner, Klaus Kriegel
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
14 years 1 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
EVOW
2007
Springer
14 years 29 days ago
Evaluating Evolutionary Algorithms and Differential Evolution for the Online Optimization of Fermentation Processes
Abstract. Although important contributions have been made in recent years within the field of bioprocess model development and validation, in many cases the utility of even relativ...
Miguel Rocha, José P. Pinto, Isabel Rocha, ...