Sciweavers

CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 11 months ago
On CSP and the Algebraic Theory of Effects
We consider CSP from the point of view of the algebraic theory of effects, which classifies operations as effect constructors and effect deconstructors; it also provides a link wit...
Rob J. van Glabbeek, Gordon D. Plotkin
CORR
2010
Springer
55views Education» more  CORR 2010»
13 years 11 months ago
Known Algorithms on Graphs of Bounded Treewidth are Probably Optimal
Daniel Lokshtanov, Dániel Marx, Saket Saura...
CORR
2010
Springer
210views Education» more  CORR 2010»
13 years 11 months ago
Test Case Generation for Object-Oriented Imperative Languages in CLP
Testing is a vital part of the software development process. Test Case Generation (TCG) is the process of automatically generating a collection of test-cases which are applied to ...
Miguel Gómez-Zamalloa, Elvira Albert, Germ&...
CORR
2010
Springer
153views Education» more  CORR 2010»
13 years 11 months ago
Characterising Probabilistic Processes Logically
Abstract. In this paper we work on (bi)simulation semantics of processes that exhibit both nondeterministic and probabilistic behaviour. We propose a probabilistic extension of the...
Yuxin Deng, Rob J. van Glabbeek
CORR
2010
Springer
166views Education» more  CORR 2010»
13 years 11 months ago
I-Interaction: An Intelligent In-Vehicle User Interaction Model
The automobile is always a point of interest where new technology has been deployed. Because of this interest, human-vehicle interaction has been an appealing area for much resear...
Li Liu, Edward Dillon
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 11 months ago
Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network
The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third gener...
R. Shankar, Timothy Rajkumar, P. Dananjayan
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 11 months ago
Reputation-Based Attack-Resistant Cooperation Stimulation (RACS) For Mobile Ad hoc Networks
In mobile ad hoc networks (MANET), nodes usually belong to different authorities and pursue different goals. In order to maximize their own performance, nodes in such networks ten...
Anuradha Banerjee, Paramartha Dutta
CORR
2010
Springer
196views Education» more  CORR 2010»
13 years 11 months ago
Comparison Of Modified Dual Ternary Indexing And Multi-Key Hashing Algorithms For Music Information Retrieval
In this work we have compared two indexing algorithms that have been used to index and retrieve Carnatic music songs. We have compared a modified algorithm of the Dual ternary ind...
Rajeswari Sridhar, A. Amudha, S. Karthiga, T. V. G...
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 11 months ago
Perceptual Copyright Protection Using Multiresolution Wavelet-Based Watermarking And Fuzzy Logic
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying...
Ming-Shing Hsieh