Sciweavers

ITA
2007
104views Communications» more  ITA 2007»
13 years 11 months ago
Automata, Borel functions and real numbers in Pisot base
This note is about functions f : Aω → Bω whose graph is recognized by a B¨uchi finite automaton on the product alphabet A × B. These functions are Baire class 2 in the Bair...
Benoit Cagnard, Pierre Simonnet
ITA
2007
13 years 11 months ago
Correct rounding of algebraic functions
We explicit the link between the computer arithmetic problem of providing correctly rounded algebraic functions and some diophantine approximation issues. This allows to get bounds...
Nicolas Brisebarre, Jean-Michel Muller
ITA
2007
13 years 11 months ago
Three notes on the complexity of model checking fixpoint logic with chop
Abstract. This paper analyses the complexity of model checking Fixpoint Logic with Chop – an extension of the modal µ-calculus with a sequential composition operator. It uses tw...
Martin Lange
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
13 years 11 months ago
Complexity in scalable computing
f abstraction (hardware) to the highest (people). This issue's theme encompasses this entire spectrum. The lead author of each article resides in the Scalable Computing Resear...
Damian W. I. Rouson
SCN
2008
Springer
140views Communications» more  SCN 2008»
13 years 11 months ago
User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS)
The Multimedia Broadcast Multicast Service (MBMS) has been included in the 3GGP architecture to provide broadcast/multicast services. In the 3GPP Long Term Evolution, the evolved M...
Simone Teofili, Michele Di Mascolo, Cristina Basil...
SCN
2008
Springer
104views Communications» more  SCN 2008»
13 years 11 months ago
Architecture and protocols of the future European quantum key distribution network
Mehrdad Dianati, Romain Alleaume, Maurice Gagnaire...
SCN
2008
Springer
147views Communications» more  SCN 2008»
13 years 11 months ago
Privacy-preserving secure relative localization in vehicular networks
Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must cons...
Lei Tang, Xiaoyan Hong, Phillip G. Bradford
SCN
2008
Springer
105views Communications» more  SCN 2008»
13 years 11 months ago
Designing fault tolerant networks to prevent poison message failure
Xiaojiang Du, Mark A. Shayman, Ronald A. Skoog
SCN
2008
Springer
116views Communications» more  SCN 2008»
13 years 11 months ago
Security issues in massive online games
Jiankun Hu, Fabio Zambetta