Sciweavers

281 search results - page 28 / 57
» Primitive words and roots of words
Sort
View
ESORICS
2010
Springer
13 years 8 months ago
Verifying Security Property of Peer-to-Peer Systems Using CSP
Due to their nature, Peer-to-Peer (P2P) systems are subject to a wide range of security issues. In this paper, we focus on a specific security property, called the root authenticit...
Tien Tuan Anh Dinh, Mark Ryan
DM
2008
98views more  DM 2008»
13 years 7 months ago
Constructing equidissections for certain classes of trapezoids
We investigate equidissections of a trapezoid T(a), where the ratio of the lengths of two parallel sides is a. (An equidissection is a dissection into triangles of equal areas.) A...
Charles H. Jepsen, Paul Monsky
ENTCS
2006
113views more  ENTCS 2006»
13 years 7 months ago
A Large-Scale Experiment in Executing Extracted Programs
It is a well-known fact that algorithms are often hidden inside mathematical proofs. If these proofs are formalized inside a proof assistant, then a mechanism called extraction ca...
Luís Cruz-Filipe, Pierre Letouzey
ENTCS
2006
94views more  ENTCS 2006»
13 years 7 months ago
Reasoning About Partial Functions in the Formal Development of Programs
Partial functions and operators are used extensively in the formal development of programs and thus development methods have to clarify how to reason about them. There are a numbe...
Cliff B. Jones
JUCS
2007
108views more  JUCS 2007»
13 years 7 months ago
Integrating Module Checking and Deduction in a Formal Proof for the Perlman Spanning Tree Protocol (STP)
: In the IEEE 802.1D standard for the Media Access Control layer (MAC layer) bridges, there is an STP (Spanning Tree Protocol) definition, based on the algorithm that was proposed...
Hossein Hojjat, Hootan Nakhost, Marjan Sirjani