Sciweavers

3820 search results - page 436 / 764
» Bounded Model Debugging
Sort
View
TOCL
2008
102views more  TOCL 2008»
15 years 3 months ago
Flat and one-variable clauses: Complexity of verifying cryptographic protocols with single blind copying
Cryptographic protocols with single blind copying were defined and modeled by Comon and Cortier using the new class C of first order clauses, which extends the Skolem class. They s...
Helmut Seidl, Kumar Neeraj Verma
TWC
2008
101views more  TWC 2008»
15 years 3 months ago
Interplay of spectral efficiency, power and doppler spectrum for reference-signal-assisted wireless communication
Expressions relating spectral efficiency, power, and Doppler spectrum, are derived for Rayleigh-faded wireless channels with Gaussian signal transmission. No side information on th...
Angel Lozano
ITA
2000
15 years 3 months ago
Construction of very hard functions for multiparty communication complexity
We consider the multiparty communication model de ned in 4] using the formalism from 8]. First, we correct an inaccuracy in the proof of the fundamental result of 6] providing a lo...
Ján Manuch
MOC
2002
93views more  MOC 2002»
15 years 3 months ago
Conjugate gradient method for dual-dual mixed formulations
We deal with the iterative solution of linear systems arising from so-called dual-dual mixed finite element formulations. The linear systems are of a two-fold saddle point structur...
Gabriel N. Gatica, Norbert Heuer
121
Voted
ESI
2010
85views more  ESI 2010»
15 years 2 months ago
Application of uncertainty visualization methods to meteorological trajectories
— We present applications of uncertainty visualization methods to a global meteorological model, allowing better understanding of the composition of the local environment of deve...
Ryan A. Boller, Scott A. Braun, Jadrian Miles, Dav...