Sciweavers

2625 search results - page 34 / 525
» Applications 2000
Sort
View
WIESS
2000
15 years 1 months ago
Dynamic Memory Management with Garbage Collection for Embedded Applications
A software system can be called a safe-system with respect to memory, when it supports only strong-typing and it does not allow for the manual disposal of dynamic memory [2]. The ...
Roberto Brega, Gabrio Rivera
COMCOM
2000
97views more  COMCOM 2000»
14 years 11 months ago
Verification of security protocols using LOTOS-method and application
We explain how the formal language LOTOS can be used to specify security protocols and cryptographic operations. We describe how security properties can be modelled as safety prop...
Guy Leduc, François Germeau
COMBINATORICA
2000
157views more  COMBINATORICA 2000»
14 years 11 months ago
Concentration of Multivariate Polynomials and Its Applications
Suppose t1, ..., tn are independent random variables which take value either 0 or 1, and Y is a multi-variable polynomial in ti's with positive coefficients. We give a conditi...
Jeong Han Kim, Van H. Vu
DM
2000
76views more  DM 2000»
14 years 11 months ago
Applications of integer relation algorithms
Let a be a vector of real numbers. By an integer relation for a we mean a non-zero integer vector c such that caT = 0. We discuss the algorithms for nding such integer relations f...
Jonathan M. Borwein, Petr Lisonek
CCR
2000
78views more  CCR 2000»
14 years 11 months ago
Notes on the use of RTP for shared workspace applications
The Real-time Transport Protocol, RTP, has become the dominant protocol for streaming audio and video in IP-based environments. A number of proposals have been made which attempt ...
Colin Perkins, Jon Crowcroft