Sciweavers

2200 search results - page 344 / 440
» Bloch's Constant is Computable
Sort
View
IANDC
2007
151views more  IANDC 2007»
14 years 10 months ago
Transducer-based analysis of cryptographic protocols
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
Ralf Küsters, Thomas Wilke
PE
2006
Springer
107views Optimization» more  PE 2006»
14 years 10 months ago
Efficient steady-state analysis of second-order fluid stochastic Petri nets
This paper presents an efficient solution technique for the steady-state analysis of the second-order Stochastic Fluid Model underlying a second-order Fluid Stochastic Petri Net (...
Marco Gribaudo, Rossano Gaeta
SIGMETRICS
2008
ACM
14 years 10 months ago
Managing inter-domain traffic in the presence of bittorrent file-sharing
Overlay routing operating in a selfish manner is known to cause undesired instability when it interacts with native layer routing. We observe similar selfish behavior with the Bit...
Srinivasan Seetharaman, Mostafa H. Ammar
ANOR
2005
56views more  ANOR 2005»
14 years 10 months ago
Two-Machine Flowshop Batching and Scheduling
: We consider in this paper a two-machine flowshop scheduling problem in which the first machine processes jobs individually while the second machine processes jobs in batches. The...
Bertrand M. T. Lin, T. C. Edwin Cheng
TCS
2008
14 years 10 months ago
A small trip in the untranquil world of genomes: A survey on the detection and analysis of genome rearrangement breakpoints
Genomes are dynamic molecules that are constantly undergoing mutations and rearrangements. The latter are large scale changes in a genome organisation that participate in the evol...
Claire Lemaitre, Marie-France Sagot