Sciweavers

COCO
2004
Springer
119views Algorithms» more  COCO 2004»
14 years 3 months ago
Tight Lower Bounds for Certain Parameterized NP-Hard Problems
Based on the framework of parameterized complexity theory, we derive tight lower bounds on the computational complexity for a number of well-known NP-hard problems. We start by pr...
Jianer Chen, Benny Chor, Mike Fellows, Xiuzhen Hua...
COCO
2004
Springer
185views Algorithms» more  COCO 2004»
14 years 3 months ago
Limitations of Quantum Advice and One-Way Communication
Abstract: Although a quantum state requires exponentially many classical bits to describe, the laws of quantum mechanics impose severe restrictions on how that state can be accesse...
Scott Aaronson
ASIAN
2006
Springer
98views Algorithms» more  ASIAN 2006»
14 years 3 months ago
Information Hiding in the Join Calculus
Abstract. We aim to provide information hiding support in concurrent object-oriented programming languages. We study the issue both at the object level and class level, in the cont...
Qin Ma 0002, Luc Maranget
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
14 years 3 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
ASIAN
2006
Springer
126views Algorithms» more  ASIAN 2006»
14 years 3 months ago
Certificateless Authenticated Two-Party Key Agreement Protocols
Tarjei K. Mandt, Chik How Tan
ASIAN
2006
Springer
140views Algorithms» more  ASIAN 2006»
14 years 3 months ago
On Completeness of Logical Relations for Monadic Types
Interesting properties of programs can be expressed using contextual equivalence. The latter is difficult to prove directly, hence (pre-)logical relations are often used as a tool ...
Slawomir Lasota, David Nowak, Yu Zhang
ASIAN
2006
Springer
103views Algorithms» more  ASIAN 2006»
14 years 3 months ago
Breaking and Fixing Public-Key Kerberos
Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov,...
ASIAN
2006
Springer
139views Algorithms» more  ASIAN 2006»
14 years 3 months ago
A Symbolic Intruder Model for Hash-Collision Attacks
Yannick Chevalier, Mounira Kourjieh
ASIAN
2006
Springer
140views Algorithms» more  ASIAN 2006»
14 years 3 months ago
Modeling Urgency in Component-Based Real-Time Systems
A component-based realtime system is a simple model for the server-client relation with time constraints. This paper presents an efficient algorithm, called a blackbox testing algo...
Nguyen Van Tang, Dang Van Hung, Mizuhito Ogawa
ASIAN
2006
Springer
80views Algorithms» more  ASIAN 2006»
14 years 3 months ago
Combination of Abstractions in the ASTRÉE Static Analyzer
Patrick Cousot, Radhia Cousot, Jérôme...