Sciweavers

5484 search results - page 2 / 1097
» Almost-Everywhere Secure Computation
Sort
View
ATVA
2005
Springer
132views Hardware» more  ATVA 2005»
13 years 10 months ago
Flat Counter Automata Almost Everywhere!
Abstract. This paper argues that flatness appears as a central notion in the verification of counter automata. A counter automaton is called flat when its control graph can be ...
Jérôme Leroux, Grégoire Sutre
STACS
2012
Springer
12 years 13 days ago
The Denjoy alternative for computable functions
The Denjoy-Young-Saks Theorem from classical analysis states that for an arbitrary function f : R → R, the Denjoy alternative holds outside a null set, i.e., for almost every re...
Laurent Bienvenu, Rupert Hölzl, Joseph S. Mil...
MST
2008
94views more  MST 2008»
13 years 4 months ago
Partial Bi-immunity, Scaled Dimension, and NP-Completeness
The Turing and many-one completeness notions for NP have been previously separated under measure, genericity, and bi-immunity hypotheses on NP. The proofs of all these results rel...
John M. Hitchcock, Aduri Pavan, N. V. Vinodchandra...
ANOR
2010
139views more  ANOR 2010»
13 years 3 months ago
Some operations research methods for analyzing protein sequences and structures
Operations Research is probably one of the most successful fields of applied mathematics used in Economics, Physics, Chemistry, almost everywhere onehastoanalyzehugeamountsofdata.L...
Piotr Lukasiak, Jacek Blazewicz, Maciej Milostan
AINA
2004
IEEE
13 years 8 months ago
Performance Improvement for GPRS, WLAN Integration using Ad Hoc Networks
As the wireless technology evolves, one can access the Internet almost everywhere via many wireless access networks such as wireless LAN and GPRS. People would like to use the wir...
Jui-Ming Chen, Li-Der Chou