Sciweavers

49 search results - page 10 / 10
» Uniform Heyting arithmetic
Sort
View
WSNA
2003
ACM
13 years 10 months ago
Analyzing and modeling encryption overhead for sensor network nodes
Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices in...
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Ped...
FUN
2010
Springer
269views Algorithms» more  FUN 2010»
13 years 10 months ago
The Feline Josephus Problem
In the classic Josephus problem, elements 1, 2, . . . , n are placed in order around a circle and a skip value k is chosen. The problem proceeds in n rounds, where each round consi...
Frank Ruskey, Aaron Williams
DBPL
1993
Springer
141views Database» more  DBPL 1993»
13 years 9 months ago
Some Properties of Query Languages for Bags
In this paper we study the expressive power of query languages for nested bags. We de ne the ambient bag language by generalizing the constructs of the relational language of Brea...
Leonid Libkin, Limsoon Wong
CASC
2006
Springer
128views Mathematics» more  CASC 2006»
13 years 9 months ago
New Domains for Applied Quantifier Elimination
We address various aspects of our computer algebra-based computer logic system redlog. There are numerous examples in the literature for successful applications of redlog to practi...
Thomas Sturm