Sciweavers

STACS
2010
Springer
13 years 11 months ago
The Complexity of the List Homomorphism Problem for Graphs
We completely characterise the computational complexity of the list homomorphism problem for graphs in combinatorial and algebraic terms: for every graph H the problem is either N...
László Egri, Andrei A. Krokhin, Beno...
ACMSE
2007
ACM
13 years 11 months ago
Verifying design modularity, hierarchy, and interaction locality using data clustering techniques
Modularity, hierarchy, and interaction locality are general approaches to reducing the complexity of any large system. A widely used principle in achieving these goals in designin...
Liguo Yu, Srini Ramaswamy
ACMSE
2007
ACM
13 years 11 months ago
Change propagations in the maintenance of kernel-based software with a study on Linux
As a software system evolves to accommodate new features and repair bugs, changes are needed. Software components are interdependent, changes made to one component can require cha...
Liguo Yu, Srini Ramaswamy
ITICSE
2010
ACM
13 years 11 months ago
Experience report: CS1 for majors with media computation
Previous reports of a media computation approach to teaching programming have either focused on pre-CS1 courses or courses for non-majors. We report the adoption of a media comput...
Beth Simon, Päivi Kinnunen, Leo Porter, Dov Z...
CCA
2009
Springer
13 years 11 months ago
On the Computability of Rectifiable Simple Curve (Extended Abstract)
d Abstract) Robert Rettinger1 and Xizhong Zheng2,3 1 Lehrgebiet Algorithmen und Komplexit
Robert Rettinger, Xizhong Zheng
CCA
2009
Springer
13 years 11 months ago
Effective Choice and Boundedness Principles in Computable Analysis
Abstract. In this paper we study a new approach to classify mathematical theorems according to their computational content. Basically, we are asking the question which theorems can...
Vasco Brattka, Guido Gherardi
CCA
2009
Springer
13 years 11 months ago
Effective Dispersion in Computable Metric Spaces
We investigate the relationship between computable metric spaces (X, d, ) and (X, d, ), where (X, d) is a given metric space. In the case of Euclidean space, and are equivalent u...
Zvonko Iljazovic
ACSC
2007
IEEE
13 years 11 months ago
Segmentation and Border Identification of Cells in Images of Peripheral Blood Smear Slides
We present an unsupervised blood cell segmentation algorithm for images taken from peripheral blood smear slides. Unlike prior algorithms the method is fast; fully automated; find...
Nicola Ritter, James R. Cooper
ACSC
2007
IEEE
13 years 11 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
ACSC
2009
IEEE
13 years 11 months ago
Verification of the SIP Transaction Using Coloured Petri Nets
The Session Initiation Protocol (SIP) is one of the leading protocols for multimedia control over the Internet, including initiating, maintaining and terminating multimedia sessio...
Lin Liu