Sciweavers

CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 5 months ago
Modeling Adversaries in a Logic for Security Protocol Analysis
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Joseph Y. Halpern, Riccardo Pucella
CORR
2006
Springer
79views Education» more  CORR 2006»
13 years 5 months ago
Geometric definition of a new skeletonization concept
Yannis Bakopoulos, Theophanis Raptis, Doxaras Ioan...
CORR
2006
Springer
105views Education» more  CORR 2006»
13 years 5 months ago
Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems
Reputation and recommendation systems are fundamental for the formation of community market places. Yet, they are easy targets for attacks which disturb a market's equilibriu...
Nicolai Kuntze, Dominique Maehler, Andreas U. Schm...
CORR
2006
Springer
80views Education» more  CORR 2006»
13 years 5 months ago
A polynomial-time approximation algorithm for the number of k-matchings in bipartite graphs
We show that the number of k-matching in a given undirected graph G is equal to the number of perfect matching of the corresponding graph Gk on an even number of vertices divided ...
Shmuel Friedland, Daniel Levy
CORR
2006
Springer
83views Education» more  CORR 2006»
13 years 5 months ago
Bidding to the Top: VCG and Equilibria of Position-Based Auctions
Gagan Aggarwal, S. Muthukrishnan, Jon Feldman
CORR
2006
Springer
57views Education» more  CORR 2006»
13 years 5 months ago
Program Spectra Analysis in Embedded Software: A Case Study
Rui Abreu, Peter Zoeteweij, Arjan J. C. van Gemund
CORR
2006
Springer
141views Education» more  CORR 2006»
13 years 5 months ago
Ideas by Statistical Mechanics (ISM)
Ideas by Statistical Mechanics (ISM) is a generic program to model evolution and propagation of ideas/patterns throughout populations subjected to endogenous and exogenous interac...
Lester Ingber