Sciweavers

3122 search results - page 77 / 625
» A Theory of Network Equivalence
Sort
View
RTA
2009
Springer
15 years 4 months ago
YAPA: A Generic Tool for Computing Intruder Knowledge
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages...
Mathieu Baudet, Véronique Cortier, St&eacut...
PERCOM
2004
ACM
15 years 9 months ago
Towards a Theory of Context Spaces
This paper proposes initial steps towards a conceptual framework for context-aware systems. It is an attempt towards a general context model to aid thinking and describing context...
Amir Padovitz, Seng Wai Loke, Arkady B. Zaslavsky
JAIR
2010
111views more  JAIR 2010»
14 years 8 months ago
Grounding FO and FO(ID) with Bounds
Grounding is the task of reducing a first-order theory and finite domain to an equivalent propositional theory. It is used as preprocessing phase in many logic-based reasoning s...
Johan Wittocx, Maarten Mariën, Marc Denecker
SAGT
2010
Springer
223views Game Theory» more  SAGT 2010»
14 years 8 months ago
Improved Lower Bounds on the Price of Stability of Undirected Network Design Games
Abstract. Bounding the price of stability of undirected network design games with fair cost allocation is a challenging open problem in the Algorithmic Game Theory research agenda....
Vittorio Bilò, Ioannis Caragiannis, Angelo ...
PODC
2003
ACM
15 years 3 months ago
Geometric ad-hoc routing: of theory and practice
All too often a seemingly insurmountable divide between theory and practice can be witnessed. In this paper we try to contribute to narrowing this gap in the field of ad-hoc rout...
Fabian Kuhn, Roger Wattenhofer, Yan Zhang, Aaron Z...