Sciweavers

2703 search results - page 422 / 541
» Working Class Hero
Sort
View
JCS
2010
80views more  JCS 2010»
13 years 4 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
JFR
2010
119views more  JFR 2010»
13 years 4 months ago
Unsupervised classification of dynamic obstacles in urban environments
This paper presents a solution to the problem of unsupervised classification of dynamic obstacles in urban environments. A track-based model is introduced for the integration of 2...
Roman Katz, Juan Nieto, Eduardo Mario Nebot
JOC
2010
96views more  JOC 2010»
13 years 4 months ago
On the Efficient Generation of Prime-Order Elliptic Curves
We consider the generation of prime-order elliptic curves (ECs) over a prime field Fp using the Complex Multiplication (CM) method. A crucial step of this method is to compute the ...
Elisavet Konstantinou, Aristides Kontogeorgis, Yan...
JUCS
2010
135views more  JUCS 2010»
13 years 4 months ago
Internal Representation of Database Views
: Although a database view embodies partial information about the state of the main schema, the state of the view schema is a quotient (and not a subset) of the state of the main s...
Stephen J. Hegner
JUCS
2010
115views more  JUCS 2010»
13 years 4 months ago
Redundant Relations in Relational Databases: A Model Theoretic Perspective
: We initiate in this work the study of a sort of redundancy problem revealed by what we call redundant relations. Roughly, we define a redundant relation in a database instance (d...
Flavio Antonio Ferrarotti, Alejandra Lorena Paolet...