Sciweavers

302 search results - page 27 / 61
» Science in the Palms of Their Hands
Sort
View
RTA
2005
Springer
14 years 1 months ago
Intruder Deduction for AC-Like Equational Theories with Homomorphisms
Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocol...
Pascal Lafourcade, Denis Lugiez, Ralf Treinen
SPIN
2005
Springer
14 years 1 months ago
An Incremental Heap Canonicalization Algorithm
Abstract. The most expensive operation in explicit state model checking is the hash computation required to store the explored states in a hash table. One way to reduce this comput...
Madanlal Musuvathi, David L. Dill
STACS
2005
Springer
14 years 1 months ago
Solving Medium-Density Subset Sum Problems in Expected Polynomial Time
The subset sum problem (SSP) (given n numbers and a target bound B, find a subset of the numbers summing to B), is one of the classical NP-hard problems. The hardness of SSP vari...
Abraham Flaxman, Bartosz Przydatek
GG
2004
Springer
14 years 28 days ago
Tutorial on DNA Computing and Graph Transformation
that graph transformations provide the right level of abstraction, and useful technical tools for studying gene assembly. On the other hand, the gene assembly process inspires a ne...
Tero Harju, Ion Petre, Grzegorz Rozenberg
GI
2004
Springer
14 years 28 days ago
Olympic Run
: Most game interfaces restrict the player to a place in front of the computer screen. In mixed reality applications the point of interaction seems to be moving away from technical...
Martin Faust, Daniel Cermak-Sassenrath