Sciweavers

CORR
1999
Springer
138views Education» more  CORR 1999»
13 years 11 months ago
A simple proof of the unconditional security of quantum key distribution
Quantum key distribution is the best known application of quantum cryptography. Previously proposed proofs of security of quantum key distribution contain various technical subtle...
Hoi-Kwong Lo
CORR
1999
Springer
139views Education» more  CORR 1999»
13 years 11 months ago
Combinatorics of branchings in higher dimensional automata
ABSTRACT. We explore the combinatorial properties of the branching areas of execution paths in higher dimensional automata. Mathematically, this means that we investigate the combi...
Philippe Gaucher
CORR
1999
Springer
81views Education» more  CORR 1999»
13 years 11 months ago
The Average-Case Area of Heilbronn-Type Triangles
Tao Jiang, Ming Li, Paul M. B. Vitányi
CORR
1999
Springer
124views Education» more  CORR 1999»
13 years 11 months ago
An Algebraic Programming Style for Numerical Software and its Optimization
The abstract mathematical theory of partial differential equations (PDEs) is formulated in terms of manifolds,scalar fields, tensors, and the like, but these algebraic structures a...
T. B. Dinesh, Magne Haveraaen, Jan Heering
CORR
1999
Springer
110views Education» more  CORR 1999»
13 years 11 months ago
Managing Object-Oriented Integration and Regression Testing
Abstract: Systematic testing of object-oriented software turned out to be much more complex than testing conventional software. Especially the highly incremental and iterative deve...
Mario Winter
CORR
1999
Springer
120views Education» more  CORR 1999»
13 years 11 months ago
A Machine-Independent Debugger--Revisited
Most debuggers are notoriously machine-dependent, but some recent research prototypes achieve varying degrees of machine-independence with novel designs. Cdb, a simple source-leve...
David R. Hanson
CORR
1999
Springer
111views Education» more  CORR 1999»
13 years 11 months ago
On Bounded-Weight Error-Correcting Codes
: This paper computationally obtains optimal bounded-weight, binary, error-correcting codes for a variety of distance bounds and dimensions. We compare the sizes of our codes to th...
Russell Bent, Michael Schear, Lane A. Hemaspaandra...
CORR
1999
Springer
104views Education» more  CORR 1999»
13 years 11 months ago
Brittle System Analysis
The goal of this paper is to define and analyze systems which exhibit brittle behavior. This behavior is characterized by a sudden and steep decline in performance as the system s...
Stephen F. Bush, John E. Hershey, Kirby Vosburgh