Sciweavers

3122 search results - page 9 / 625
» A Theory of Network Equivalence
Sort
View
ASPDAC
2009
ACM
135views Hardware» more  ASPDAC 2009»
15 years 4 months ago
Analysis of communication delay bounds for network on chips
—In network-on-chip, computing worst-case delay bound for packet delivery is crucial for designing predictable systems but yet an intractable problem due to complicated resource ...
Yue Qian, Zhonghai Lu, Wenhua Dou
67
Voted
IJAC
2006
67views more  IJAC 2006»
14 years 9 months ago
Conjugacy Invariants of Subshifts: an Approach from Profinite Semigroup Theory
: It is given a structural conjugacy invariant in the set of pseudowords whose finite factors are factors of a given subshift. Some profinite semigroup tools are developed for this...
Alfredo Costa
EPIA
2005
Springer
15 years 3 months ago
Reducing Propositional Theories in Equilibrium Logic to Logic Programs
The paper studies reductions of propositional theories in equilibrium logic to logic programs under answer set semantics. Specifically we are concerned with the question of how to...
Pedro Cabalar, David Pearce, Agustín Valver...
LICS
2008
IEEE
15 years 4 months ago
On the Axiomatizability of Impossible Futures: Preorder versus Equivalence
We investigate the (in)equational theory of impossible futures semantics over the process algebra BCCSP. We prove that no finite, sound axiomatization for BCCSP modulo impossible...
Taolue Chen, Wan Fokkink
72
Voted
ENTCS
2006
103views more  ENTCS 2006»
14 years 9 months ago
Static Equivalence is Harder than Knowledge
There are two main ways of defining secrecy of cryptographic protocols. The first version checks if the adversary can learn the value of a secret parameter. In the second version,...
Johannes Borgström