Sciweavers

3404 search results - page 563 / 681
» C Programming Tutorial
Sort
View
ESWA
2006
86views more  ESWA 2006»
14 years 9 months ago
Modeling consumer acceptance probabilities
This paper investigates how to estimate the likelihood of a customer accepting a loan offer as a function of the offer parameters and how to choose the optimal set of parameters f...
L. C. Thomas, Ki Mun Jung, Steve D. Thomas, Y. Wu
FUIN
2006
97views more  FUIN 2006»
14 years 9 months ago
Thread Algebra with Multi-Level Strategies
In a previous paper, we developed an algebraic theory about threads and multi-threading based on the assumption that a deterministic interleaving strategy determines how threads ar...
Jan A. Bergstra, C. A. Middelburg
IEICET
2006
114views more  IEICET 2006»
14 years 9 months ago
Synchronization Verification in System-Level Design with ILP Solvers
Concurrency is one of the most important issues in system-level design. Interleaving among parallel processes can cause an extremely large number of different behaviors, making de...
Thanyapat Sakunkonchak, Satoshi Komatsu, Masahiro ...
IJCSA
2006
95views more  IJCSA 2006»
14 years 9 months ago
Modeling and Formal Verification of DHCP Using SPIN
The Dynamic Host Configuration Protocol (DHCP) is a widely used communication protocol. In this paper, a portion of the protocol is chosen for modeling and verification, namely th...
Syed M. S. Islam, Mohammed H. Sqalli, Sohel Khan
IJNSEC
2006
94views more  IJNSEC 2006»
14 years 9 months ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon