Sciweavers

IFIP
2004
Springer
14 years 5 months ago
Engineering an External Memory Minimum Spanning Tree Algorithm
We develop an external memory algorithm for computing minimum spanning trees. The algorithm is considerably simpler than previously known external memory algorithms for this proble...
Roman Dementiev, Peter Sanders, Dominik Schultes, ...
IFIP
2004
Springer
14 years 5 months ago
Dynamic and Local Typing for Mobile Ambients
Mario Coppo, Mariangiola Dezani-Ciancaglini, Elio ...
IFIP
2004
Springer
14 years 5 months ago
Regular Tree Language Recognition with Static Information
This paper presents our compilation strategy to produce efficient code for pattern matching in the CDuce compiler, taking into account static information provided by the type syst...
Alain Frisch
IFIP
2004
Springer
14 years 5 months ago
Behavioural Theory for Mobile Ambients
Massimo Merro, Francesco Zappa Nardelli
IFIP
2004
Springer
14 years 5 months ago
Truthful Mechanisms for Generalized Utilitarian Problems
In this paper we investigate extensions of the well-known Vickrey-Clarke-Groves (VCG) mechanisms to problems whose objective function is not utilitarian and whose agents’ utiliti...
Giovanna Melideo, Paolo Penna, Guido Proietti, Rog...
IFIP
2004
Springer
14 years 5 months ago
Nested Commits for Mobile Calculi: Extending Join
In global computing applications the availability of a mechanism for some form of committed choice can be useful, and sometimes necessary. It can conveniently handle, e.g., distrib...
Roberto Bruni, Hernán C. Melgratti, Ugo Mon...
IFIP
2004
Springer
14 years 5 months ago
Behavioural Equivalences for Dynamic Web Data
Peer-to-peer systems, exchanging dynamic documents through Web services, are a simple and effective platform for data integration on the internet. Dynamic documents can contain b...
Sergio Maffeis, Philippa Gardner
IFIP
2004
Springer
14 years 5 months ago
Asymptotic Behaviors of Type-2 Algorithms and Induced Baire Topologies
Abstract We propose an alternative notion of asymptotic behaviors for the study of type2 computational complexity. Since the classical asymptotic notion (for all but finitely many...
Chung-Chih Li
IFIP
2004
Springer
14 years 5 months ago
A Randomised Algorithm for Checking the Normality of Cryptographic Boolean Functions
Abstract A Boolean function is called normal if it is constant on flats of certain dimensions. This property is relevant for the construction and analysis of cryptosystems. This p...
An Braeken, Christopher Wolf, Bart Preneel