Sciweavers

15251 search results - page 210 / 3051
» Network Science - Theory and Application
Sort
View
119
Voted
FOCS
2007
IEEE
15 years 9 months ago
Strongly History-Independent Hashing with Applications
We present a strongly history independent (SHI) hash table that supports search in O(1) worst-case time, and insert and delete in O(1) expected time using O(n) data space. This ma...
Guy E. Blelloch, Daniel Golovin
98
Voted
RTA
2007
Springer
15 years 9 months ago
Adjunction for Garbage Collection with Application to Graph Rewriting
We investigate garbage collection of unreachable parts of rooted graphs from a categorical point of view. First, we define this task as the right adjoint of an inclusion functor. ...
Dominique Duval, Rachid Echahed, Fréd&eacut...
136
Voted
RANDOM
1997
Springer
15 years 7 months ago
A Combinatorial Consistency Lemma with Application to Proving the PCP Theorem
The current proof of the PCP Theorem (i.e., NP = PCP(log, O(1))) is very complicated. One source of difficulty is the technically involved analysis of low-degree tests. Here, we r...
Oded Goldreich, Shmuel Safra
157
Voted
IFIPTCS
2010
15 years 1 months ago
A Semiring-Based Trace Semantics for Processes with Applications to Information Leakage Analysis
Abstract. We propose a framework for reasoning about program security building on language-theoretic and coalgebraic concepts. The behaviour of a system is viewed as a mapping from...
Michele Boreale, David Clark, Daniele Gorla
132
Voted
GI
2009
Springer
15 years 1 months ago
Low Frequency Towed Active Sonar (LFTAS) in Multistatic Applications
: The performance potential of multistatic sonar operations has been investigated by several research institutes and proven in numerous international sea trials during the last yea...
Stephan Benen