Sciweavers

140 search results - page 14 / 28
» P3
Sort
View
PET
2004
Springer
14 years 1 months ago
Language-Based Enforcement of Privacy Policies
Abstract. We develop a language-based approach for modeling and verifying aspects of privacy policies. Our approach relies on information-flow control. Concretely, we use the prog...
Katia Hayati, Martín Abadi
CORR
2008
Springer
116views Education» more  CORR 2008»
13 years 8 months ago
The finite harmonic oscillator and its applications to sequences, communication and radar
A novel system, called the oscillator system, consisting of order of p 3 functions (signals) on the finite field p; with p an odd prime, is described and studied. The new functions...
Shamgar Gurevich, Ronny Hadani, Nir A. Sochen
AMC
2008
92views more  AMC 2008»
13 years 8 months ago
Explicit multi-step peer methods for special second-order differential equations
The construction of s-stage explicit two- and three-step peer methods of order p = 2s and p = 3s is considered for the solution of non-stiff second order initial value problems wh...
Stefan Jebens, Rüdiger Weiner, Helmut Podhais...
CORR
2008
Springer
116views Education» more  CORR 2008»
13 years 8 months ago
Group representation design of digital signals and sequences
In this survey a novel system, called the oscillator system, consisting of order of p3 functions (signals) on the finite field Fp, is described and studied. The new functions are p...
Shamgar Gurevich, Ronny Hadani, Nir A. Sochen
AMC
2006
106views more  AMC 2006»
13 years 8 months ago
Selecting two different defective coins
In this paper, given a balance scale and the information that there are exactly two different defective coins present, the authors consider the problem of ascertaining the minimum...
Mingnan Qi, Sanyang Liu