Sciweavers

1615 search results - page 4 / 323
» Computer science and decision theory
Sort
View
FCT
2009
Springer
14 years 10 days ago
Computing Role Assignments of Chordal Graphs
In social network theory, a simple graph G is called k-role assignable if there is a surjective mapping that assigns a number from {1, . . . , k} called a role to each vertex of G ...
Pim van 't Hof, Daniël Paulusma, Johan M. M. ...
RTA
2005
Springer
13 years 11 months ago
Intruder Deduction for AC-Like Equational Theories with Homomorphisms
Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocol...
Pascal Lafourcade, Denis Lugiez, Ralf Treinen
PC
2000
105views Management» more  PC 2000»
13 years 5 months ago
New advances in chemistry and materials science with CPMD and parallel computing
A short overview is presented of the density functional theory and molecular dynamics (DFT
Wanda Andreoni, Alessandro Curioni
GI
2009
Springer
13 years 3 months ago
The relation between protocols and games
: Both, games in a game theoretic sense and protocols in an informational sense describe rule based interactions between systems. Some similarities and differences of both approach...
Johannes Reich