Sciweavers

3820 search results - page 355 / 764
» Bounded Model Debugging
Sort
View
CORR
2008
Springer
139views Education» more  CORR 2008»
15 years 4 months ago
The Secrecy Graph and Some of its Properties
A new random geometric graph model, the so-called secrecy graph, is introduced and studied. The graph represents a wireless network and includes only edges over which secure commun...
Martin Haenggi
EOR
2008
84views more  EOR 2008»
15 years 4 months ago
On the dynamics of capital accumulation across space
We solve an optimal growth model in continuous space, continuous and bounded time. The optimizer chooses the optimal trajectories of capital and consumption across space and time ...
Carmen Camacho, Benteng Zou, Maya Briani
CAI
2007
Springer
15 years 4 months ago
On High-Rate Cryptographic Compression Functions
Abstract. The security of iterated hash functions relies on the properties of underlying compression functions. We study highly efficient compression functions based on block ciphe...
Richard Ostertág, Martin Stanek
TCAD
2008
181views more  TCAD 2008»
15 years 4 months ago
A Survey of Automated Techniques for Formal Software Verification
The quality and the correctness of software is often the greatest concern in electronic systems. Formal verification tools can provide a guarantee that a design is free of specific...
Vijay D'Silva, Daniel Kroening, Georg Weissenbache...
PPL
1998
117views more  PPL 1998»
15 years 4 months ago
Messy Broadcasting
In this paper, we describe an ordering of the vertices of a 2-dimensional torus and study the upper bound on the orderly broadcast time. Along with messy broadcasting, orderly bro...
Hovhannes A. Harutyunyan, Arthur L. Liestman