Sciweavers

846 search results - page 57 / 170
» The Use of Z
Sort
View
ASWEC
2006
IEEE
14 years 3 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
GI
2007
Springer
14 years 3 months ago
SIPKIS - Individualisierte Beratungssysteme
Abstract: Im folgenden Beitrag wird ein Überblick über ein Konzept zur Individualisierung von Finanzdienstleistungsberatungen gegeben. Hierfür wird zunächst die Notwendigkeit f...
Veronica Winkler, Hans Ulrich Buhl
CDC
2009
IEEE
156views Control Systems» more  CDC 2009»
14 years 1 months ago
Autonomous motorcycles for agile maneuvers, part I: Dynamic modeling
— Single-track vehicles, such as motorcycles, provide an agile mobile platform. Modeling and control of motorcycles for agile maneuvers, such as those by professional racing ride...
Jingang Yi, Yizhai Zhang, Dezhen Song
STOC
2009
ACM
136views Algorithms» more  STOC 2009»
14 years 9 months ago
Random walks on polytopes and an affine interior point method for linear programming
Let K be a polytope in Rn defined by m linear inequalities. We give a new Markov Chain algorithm to draw a nearly uniform sample from K. The underlying Markov Chain is the first t...
Ravi Kannan, Hariharan Narayanan
ESA
2008
Springer
96views Algorithms» more  ESA 2008»
13 years 11 months ago
Stabbing Convex Polygons with a Segment or a Polygon
Let O = {O1, . . . , Om} be a set of m convex polygons in R2 with a total of n vertices, and let B be another convex k-gon. A placement of B, any congruent copy of B (without refle...
Pankaj K. Agarwal, Danny Z. Chen, Shashidhara K. G...