Sciweavers

37 search results - page 4 / 8
» mst 2008
Sort
View
MST
2008
118views more  MST 2008»
13 years 6 months ago
Risk Assessment for One-Counter Threads
Abstract Threads as contained in a thread algebra are used for the modeling of sequential program behavior. A thread that may use a counter to control its execution is called a `on...
Alban Ponse, Mark van der Zwaag
MST
2008
120views more  MST 2008»
13 years 6 months ago
Bounds on Sizes of Finite Bisimulations of Pfaffian Dynamical Systems
We study finite bisimulations of dynamical systems in Rn defined by Pfaffian maps. The pure existence of finite bisimulations for a more general class of o-minimal systems was show...
Margarita V. Korovina, Nicolai Vorobjov
MST
2008
80views more  MST 2008»
13 years 6 months ago
A Revised Transformation Protocol for Unconditionally Secure Secret Key Exchange
Abstract The transformation protocol can allow two players to share an unconditionally secure secret key using a random deal of cards. A sufficient condition on the number of cards...
Koichi Koizumi, Takaaki Mizuki, Takao Nishizeki
DIALM
2008
ACM
135views Algorithms» more  DIALM 2008»
13 years 7 months ago
Symmetric range assignment with disjoint MST constraints
If V is a set of n points in the unit square [0, 1]2 , and if R : V + is an assignment of positive real numbers (radii) to to those points, define a graph G(R) as follows: {v, w}...
Eric Schmutz