Sciweavers

769 search results - page 71 / 154
» Where Is the Proof
Sort
View
ISAAC
2004
Springer
87views Algorithms» more  ISAAC 2004»
14 years 2 months ago
Random Access to Advice Strings and Collapsing Results
We propose a model of computation where a Turing machine is given random access to an advice string. With random access, an advice string of exponential length becomes meaningful ...
Jin-yi Cai, Osamu Watanabe
ISCIS
2004
Springer
14 years 2 months ago
System BV without the Equalities for Unit
System BV is an extension of multiplicative linear logic with a non-commutative self-dual operator. In this paper we present systems equivalent to system BV where equalities for un...
Ozan Kahramanogullari
SACRYPT
2004
Springer
113views Cryptology» more  SACRYPT 2004»
14 years 2 months ago
A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue
Addition-subtraction-chains obtained from signed digit recodings of integers are a common tool for computing multiples of random elements of a group where the computation of invers...
Roberto Maria Avanzi
ICSM
2003
IEEE
14 years 2 months ago
Towards a Versioning Model for Component-based Software Assembly
The world of software development has rapidly changed in the last few years due to the adoption of component-based technologies. The classical software configuration management, ...
Jaroslav Gergic
INFOCOM
2003
IEEE
14 years 2 months ago
Exploiting Wireless Channel State Information for Throughput Maximization
— We consider the problem of scheduling packets over a number of channels with time varying connectivity. Policies proposed for this problem either stabilize the system when the ...
Vagelis Tsibonis, Leonidas Georgiadis, Leandros Ta...