Sciweavers

697 search results - page 44 / 140
» On the Theory of Average Case Complexity
Sort
View
IPL
2006
118views more  IPL 2006»
13 years 7 months ago
Easy intruder deduction problems with homomorphisms
We present complexity results for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebr...
Stéphanie Delaune
ICMT
2009
Springer
14 years 2 months ago
A Collection Operator for Graph Transformation
Abstract. Graph transformation has a well-established theory and associated tools that can be used to perform model transformations. However, the lack of a construct to match and t...
Roy Grønmo, Stein Krogdahl, Birger Mø...
ICDE
2008
IEEE
131views Database» more  ICDE 2008»
14 years 2 months ago
PLUS: Synthesizing privacy, lineage, uncertainty and security
— Privacy, lineage, uncertainty, and security are important to many information integration efforts, and these “PLUS” properties interact in a number of complex ways. This pa...
Barbara T. Blaustein, Len Seligman, Michael Morse,...
ICECCS
2006
IEEE
124views Hardware» more  ICECCS 2006»
14 years 1 months ago
Engineering Emergence
We explore various definitions and characteristics of emergence, how we might recognise and measure emergence, and how we might engineer emergent systems. We discuss the TUNA (...
Susan Stepney, Fiona Polack, Heather R. Turner
MFCS
2005
Springer
14 years 1 months ago
Dimension Is Compression
Abstract. Effective fractal dimension was defined by Lutz (2003) in order to quantitatively analyze the structure of complexity classes. Interesting connections of effective dim...
María López-Valdés, Elvira Ma...