Sciweavers

22 search results - page 4 / 5
» Common subproofs in proof pairs
Sort
View
IFIP
2009
Springer
13 years 12 months ago
Trusted Multiplexing of Cryptographic Protocols
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
Jay A. McCarthy, Shriram Krishnamurthi
SIAMDM
1998
89views more  SIAMDM 1998»
13 years 5 months ago
String Noninclusion Optimization Problems
For every string inclusion relation there are two optimization problems: find a longest string included in every string of a given finite language, and find a shortest string in...
Anatoly R. Rubinov, Vadim G. Timkovsky
ESOP
2001
Springer
13 years 9 months ago
On the Complexity of Constant Propagation
Constant propagation (CP) is one of the most widely used optimizations in practice (cf. [9]). Intuitively, it addresses the problem of statically detecting whether an expression al...
Markus Müller-Olm, Oliver Rüthing
CORR
2007
Springer
126views Education» more  CORR 2007»
13 years 5 months ago
Dial a Ride from k-forest
The k-forest problem is a common generalization of both the k-MST and the dense-k-subgraph problems. Formally, given a metric space on n vertices V , with m demand pairs ⊆ V × ...
Anupam Gupta, MohammadTaghi Hajiaghayi, Viswanath ...
VIS
2005
IEEE
109views Visualization» more  VIS 2005»
14 years 6 months ago
Topological Structures of 3D Tensor Fields
Tensor topology is useful in providing a simplified and yet detailed representation of a tensor field. Recently the field of 3D tensor topology is advanced by the discovery that d...
Xiaoqiang Zheng, Beresford N. Parlett, Alex Pang