Sciweavers

3122 search results - page 50 / 625
» A Theory of Network Equivalence
Sort
View
ALENEX
2009
191views Algorithms» more  ALENEX 2009»
14 years 11 months ago
Theory and Practise of Monotone Minimal Perfect Hashing
Minimal perfect hash functions have been shown to be useful to compress data in several data management tasks. In particular, order-preserving minimal perfect hash functions [10] ...
Djamal Belazzougui, Paolo Boldi, Rasmus Pagh, Seba...
CORR
2007
Springer
98views Education» more  CORR 2007»
14 years 9 months ago
Bistable Biorders: A Sequential Domain Theory
We give a simple order-theoretic construction of a Cartesian closed category of sequential functions. It is based on bistable biorders, which are sets with a partial order — the ...
James Laird
ATVA
2006
Springer
83views Hardware» more  ATVA 2006»
15 years 1 months ago
A Fresh Look at Testing for Asynchronous Communication
Testing is one of the fundamental techniques for verifying if a computing system conforms to its specification. We take a fresh look at the theory of testing for message-passing sy...
Puneet Bhateja, Paul Gastin, Madhavan Mukund
ICNP
1998
IEEE
15 years 1 months ago
Flow Theory: An Enhancement
Flow Theory is a rich, effective theory introduced in order to study real-time network protocols. It is based on discrete mathematics in which a flow of data is represented by an ...
Alfio Lombardo, Giacomo Morabito, Sergio Palazzo, ...
HICSS
2010
IEEE
487views Biometrics» more  HICSS 2010»
15 years 4 months ago
A Survey of Game Theory as Applied to Network Security
Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two de...
Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipank...