Sciweavers

769 search results - page 117 / 154
» Where Is the Proof
Sort
View
AAECC
2005
Springer
128views Algorithms» more  AAECC 2005»
13 years 9 months ago
The size-change principle and dependency pairs for termination of term rewriting
Abstract In [24], a new size-change principle was proposed to verify termination of functional programs automatically. We extend this principle in order to prove termination and in...
René Thiemann, Jürgen Giesl
TCS
2008
13 years 9 months ago
Computational self-assembly
The object of this paper is to appreciate the computational limits inherent in the combinatorics of an applied concurrent (aka agent-based) language . That language is primarily m...
Pierre-Louis Curien, Vincent Danos, Jean Krivine, ...
TDSC
2008
99views more  TDSC 2008»
13 years 9 months ago
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit error is possible (e.g., it is possible to change a bit "0" into a...
Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy,...
JSCIC
2007
85views more  JSCIC 2007»
13 years 9 months ago
On Boundary Condition Capturing for Multiphase Interfaces
This paper begins with an overview of the boundary condition capturing approach to solving problems with interfaces. Although, the authors’ original motivation was to extend the...
Jeong-Mo Hong, Tamar Shinar, Myungjoo Kang, Ronald...
COMBINATORICS
2004
129views more  COMBINATORICS 2004»
13 years 9 months ago
Operations on Well-Covered Graphs and the Roller-Coaster Conjecture
A graph G is well-covered if every maximal independent set has the same cardinality. Let sk denote the number of independent sets of cardinality k, and define the independence pol...
Philip Matchett