Sciweavers

IANDC
2008
85views more  IANDC 2008»
13 years 4 months ago
Monotony properties of connected visible graph searching
Search games are attractive for their correspondence with classical width parameters. For instance, the invisible search number (a.k.a. node search number) of a graph is equal to
Pierre Fraigniaud, Nicolas Nisse
IANDC
2008
68views more  IANDC 2008»
13 years 4 months ago
A characterization of flip-accessibility for rhombus tilings of the whole plane
Olivier Bodini, Thomas Fernique, Eric Rémil...
IANDC
2008
95views more  IANDC 2008»
13 years 4 months ago
Comparing communication primitives via their relative expressive power
In this paper, we study sixteen communication primitives, arising from the combination of four useful programming features: synchronism (synchronous vs asynchronous primitives), a...
Daniele Gorla
IANDC
2008
76views more  IANDC 2008»
13 years 4 months ago
A framework for the verification of infinite-state graph transformation systems
Paolo Baldan, Andrea Corradini, Barbara König
IANDC
2008
105views more  IANDC 2008»
13 years 4 months ago
Symbolic protocol analysis for monoidal equational theories
We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we t...
Stéphanie Delaune, Pascal Lafourcade, Denis...
IANDC
2008
150views more  IANDC 2008»
13 years 4 months ago
Hierarchical combination of intruder theories
Recently automated deduction tools have proved to be very effective for detecting attacks on cryptographic protocols. These analysis can be improved, for finding more subtle weakn...
Yannick Chevalier, Michaël Rusinowitch
IANDC
2008
128views more  IANDC 2008»
13 years 4 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
IANDC
2008
80views more  IANDC 2008»
13 years 4 months ago
Preemptive scheduling on a small number of hierarchical machines
We consider preemptive offline and online scheduling on identical machines and uniformly related machines in the hierarchical model, with the goal of minimizing the makespan. In t...
György Dósa, Leah Epstein
IANDC
2008
109views more  IANDC 2008»
13 years 4 months ago
Compositions of extended top-down tree transducers
Abstract. Unfortunately the class of transformations computed by nondeleting and linear extended top-down tree transducers [Graehl, Knight: Training Tree Transducers. HLT-NAACL 200...
Andreas Maletti