Sciweavers

551 search results - page 60 / 111
» Natural proofs
Sort
View
ALDT
2009
Springer
126views Algorithms» more  ALDT 2009»
14 years 21 days ago
On Low-Envy Truthful Allocations
We study the problem of allocating a set of indivisible items to players having additive utility functions over the items. We consider allocations in which no player envies the bun...
Ioannis Caragiannis, Christos Kaklamanis, Panagiot...
DEXAW
2004
IEEE
124views Database» more  DEXAW 2004»
14 years 13 days ago
PAC-MEN: Personal Autonomic Computing Monitoring Environment
The overall goal of this research is to improve the `environment awareness' aspect of personal autonomic computing. Personal Computing offers unique challenges for self-manag...
Roy Sterritt, David F. Bantz
MFCS
2000
Springer
14 years 8 days ago
Bilinear Functions and Trees over the (max, +) Semiring
Abstract. We consider the iterates of bilinear functions over the semiring (max, +). Equivalently, our object of study can be viewed as recognizable tree series over the semiring (...
Sabrina Mantaci, Vincent D. Blondel, Jean Mairesse
TACAS
2000
Springer
89views Algorithms» more  TACAS 2000»
14 years 8 days ago
The PROSPER Toolkit
Abstract. The Prosper (Proof and Specification Assisted Design Environments) project advocates the use of toolkits which allow existing verification tools to be adapted to a more f...
Louise A. Dennis, Graham Collins, Michael Norrish,...
ACISP
2008
Springer
13 years 10 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...