Sciweavers

434 search results - page 61 / 87
» The Case for Browser Provenance
Sort
View
ENTCS
2006
122views more  ENTCS 2006»
13 years 8 months ago
Verification of Clock Synchronization Algorithms: Experiments on a Combination of Deductive Tools
We report on an experiment in combining Isabelle with automatic first-order arithmetic provers to increase automation on the verification of distributed protocols. As a case study...
Damián Barsotti, Leonor Prensa Nieto, Alwen...
COMCOM
2007
83views more  COMCOM 2007»
13 years 8 months ago
Improving authentication of remote card transactions with mobile personal trusted devices
Credit card transactions are a popular and diffused means of payment over the network. Unfortunately, current technology does not allow us to technically solve disputes that may ...
Andrea Bottoni, Gianluca Dini
EOR
2007
79views more  EOR 2007»
13 years 8 months ago
The directional p
An instance of a p-median problem gives n demand points. The objective is to locate p supply points in order to minimize the total distance of the demand points to their nearest s...
Laura E. Jackson, George N. Rouskas, Matthias F. M...
SIAMSC
2008
146views more  SIAMSC 2008»
13 years 8 months ago
A Continuous Interior Penalty Method for Viscoelastic Flows
In this paper we consider a finite element discretization of the Oldroyd-B model of viscoelastic flows. The method uses standard continuous polynomial finite element spaces for vel...
Andrea Bonito, Erik Burman
TCBB
2008
122views more  TCBB 2008»
13 years 8 months ago
Mixed Integer Linear Programming for Maximum-Parsimony Phylogeny Inference
Reconstruction of phylogenetic trees is a fundamental problem in computational biology. While excellent heuristic methods are available for many variants of this problem, new adva...
Srinath Sridhar, Fumei Lam, Guy E. Blelloch, R. Ra...