Sciweavers

1012 search results - page 89 / 203
» Process Algebra with Backtracking
Sort
View
IPPS
2008
IEEE
14 years 2 months ago
What is the best way to prove a cryptographic protocol correct?
In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker inferences a...
Sreekanth Malladi, Gurdeep S. Hura
ACCV
2007
Springer
14 years 2 months ago
Conic Fitting Using the Geometric Distance
We consider the problem of fitting a conic to a set of 2D points. It is commonly agreed that minimizing geometrical error, i.e. the sum of squared distances between the points and...
Peter F. Sturm, Pau Gargallo
HYBRID
2004
Springer
14 years 1 months ago
Constructing Invariants for Hybrid Systems
Abstract. An invariant of a system is a predicate that holds for every reachable state. In this paper, we present techniques to generate invariants for hybrid systems. This is achi...
Sriram Sankaranarayanan, Henny Sipma, Zohar Manna
IQIS
2007
ACM
13 years 9 months ago
On the performance of one-to-many data transformations
Relational Database Systems often support activities like data warehousing, cleaning and integration. All these activities require performing some sort of data transformations. Si...
Paulo J. F. Carreira, Helena Galhardas, Joã...
CORR
2010
Springer
118views Education» more  CORR 2010»
13 years 8 months ago
A view of canonical extension
Abstract. This is a short survey illustrating some of the essential aspects of the theory of canonical extensions. In addition some topological results about canonical extensions o...
Mai Gehrke, Jacob Vosmaer