Sciweavers

CORR
2010
Springer
60views Education» more  CORR 2010»
13 years 11 months ago
A Note on Integer Factorization Using Lattices
We revisit Schnorr's lattice-based integer factorization algorithm, now with an effective point of view. We present effective versions of Theorem 2 of [11], as well as new pro...
Antonio Ignacio Vera
CORR
2010
Springer
55views Education» more  CORR 2010»
13 years 11 months ago
On a family of cubic graphs containing the flower snarks
We consider cubic graphs formed with k 2 disjoint claws Ci K1,3 (0 i k-1) such that for every integer i modulo k the three vertices of degree 1 of Ci are joined to the three v...
Jean-Luc Fouquet, Henri Thuillier, Jean-Marie Vanh...
CORR
2010
Springer
103views Education» more  CORR 2010»
13 years 11 months ago
Securing Internet Protocol (IP) Storage: A Case Study
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many pot...
Siva Rama Krishnan Somayaji, Ch. A. S. Murty
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 11 months ago
Spatial logics with connectedness predicates
Abstract. We consider quantifier-free spatial logics, designed for qualitative spatial representation and reasoning in AI, and extend them with the means to represent topological c...
Roman Kontchakov, Ian Pratt-Hartmann, Frank Wolter...
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 11 months ago
How to prevent type-flaw attacks on security protocols under algebraic properties
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Sreekanth Malladi, Pascal Lafourcade
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 11 months ago
Automatic analysis of distance bounding protocols
Distance bounding protocols are used by nodes in wireless networks for the crucial purpose of estimating their distances to other nodes. Past efforts to analyze these protocols hav...
Sreekanth Malladi, Bezawada Bruhadeshwar, Kishore ...
CORR
2010
Springer
96views Education» more  CORR 2010»
13 years 11 months ago
Truth and Envy in Capacitated Allocation Games
Edith Cohen, Michal Feldman, Amos Fiat, Haim Kapla...
CORR
2010
Springer
196views Education» more  CORR 2010»
13 years 11 months ago
SWiM -- A Semantic Wiki for Mathematical Knowledge Management
Abstract. SWiM is a semantic wiki for collaboratively building, editing and browsing mathematical knowledge represented in the domainspecific structural semantic markup language OM...
Christoph Lange 0002
CORR
2010
Springer
53views Education» more  CORR 2010»
13 years 11 months ago
wiki.openmath.org - how it works, how you can participate
At http://wiki.openmath.org, the OpenMath 2 and 3 Content Dictionaries are accessible via a semantic wiki interface, powered by the SWiM system. We shortly introduce the inner work...
Christoph Lange 0002