Sciweavers

562 search results - page 21 / 113
» Third quarter 2008
Sort
View
JLP
2008
81views more  JLP 2008»
13 years 10 months ago
Cut-free sequent systems for temporal logic
Currently known sequent systems for temporal logics such as linear time temporal logic and computation tree logic either rely on a cut rule, an invariant rule, or an infinitary ru...
Kai Brünnler, Martin Lange
JQL
2008
97views more  JQL 2008»
13 years 10 months ago
Dependency-length minimization in natural and artificial languages
A wide range of evidence points to a preference for syntactic structures in which dependencies are short. Here we examine the question: what kinds of dependency configurations min...
David Temperley
JUCS
2008
90views more  JUCS 2008»
13 years 10 months ago
A Survey of Practical Software Adaptation Techniques
: Software adaptation techniques appear in many disparate areas of research literature, and under many guises. This paper enables a clear and uniform understanding of the related r...
Stephen Kell
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
13 years 10 months ago
A New ID-Based Deniable Authentication Protocol
Abstract. Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being ...
Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Ba...
INFORMATICALT
2007
109views more  INFORMATICALT 2007»
13 years 10 months ago
A Secure YS-Like User Authentication Scheme
Abstract. Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choos...
Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu