Sciweavers

IANDC
2008
70views more  IANDC 2008»
13 years 11 months ago
Symmetric electoral systems for ambient calculi
Iain Phillips, Maria Grazia Vigliotti
IANDC
2008
101views more  IANDC 2008»
13 years 11 months ago
Trees with exponentially growing costs
We investigate code trees and search trees with cost functions that increase exponentially with the depth in the tree. While corresponding coding theorems have been considered in ...
Frank Schulz
IANDC
2008
86views more  IANDC 2008»
13 years 11 months ago
Unambiguous Boolean grammars
Abstract. Boolean grammars are an extension of context-free grammars, in which all propositional connectives are allowed. In this paper, the notion of ambiguity in Boolean grammars...
Alexander Okhotin
IANDC
2008
141views more  IANDC 2008»
13 years 11 months ago
Graph connectivity, partial words, and a theorem of Fine and Wilf
The problem of computing periods in words, or finite sequences of symbols from a finite alphabet, has important applications in several areas including data compression, string se...
Francine Blanchet-Sadri, Deepak Bal, Gautam Sisodi...
IANDC
2008
111views more  IANDC 2008»
13 years 11 months ago
Bin packing with controllable item sizes
We consider a natural resource allocation problem in which we are given a set of items, where each item has a list of pairs associated with it. Each pair is a configuration of an a...
José R. Correa, Leah Epstein
IANDC
2008
74views more  IANDC 2008»
13 years 11 months ago
Execution monitoring enforcement under memory-limitation constraints
Recently, attention has been given to formally characterize security policies that are enforceable by different kinds of security mechanisms. A very important research problem is ...
Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi
IANDC
2008
89views more  IANDC 2008»
13 years 11 months ago
Anonymity protocols as noisy channels
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
IANDC
2008
120views more  IANDC 2008»
13 years 11 months ago
A framework for compositional verification of security protocols
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysi...
Suzana Andova, Cas J. F. Cremers, Kristian Gj&osla...
IANDC
2008
115views more  IANDC 2008»
13 years 11 months ago
Fair multi-party contract signing using private contract signatures
A multi-party contract signing protocol allows a set of participants to exchange messages with each other with a view to arriving in a state in which each of them has a pre-agreed...
Aybek Mukhamedov, Mark Dermot Ryan